In every night of non-traffic hours, different jobs are conducting maintenance works in “Railway” trackside area. This project will explain a specific section of track under the sole control an Engineer’s Person-in-Charge as procedures. And how to provide protection methods by which a person or persons
on or near a track are safeguarded from potential train movements or a train is safeguarded from other train movements or obstructions, or persons or equipment are safeguarded from traction power.Consolidated past several investigation reports and according to related is rules, workflow or procedures etc. to summarize. There are protection tools left on trackside area incident caused by the workers are forgetting and poor management. Proposed are different project themes in the light of their expertise, experience and observation in their daily works. The proposed themes are compared, assessed
and prioritized under the criteria - “Manageable”, “Measurable”, “Result of Benefit”, “Standardization” and “Priority” in the Decision Matrix. Establish some solve problem methods for
comparing to find out which that lower-cost plan accordingly. I came up with a conclusion and the ideas as develop a mobile application and create a unique QR code label with equipment naming to facilitate each worker management of protection tools. This is also fulfilled in popular terms of Creativity and
Innovations. Used the MIT App Inventor (Massachusetts Institute of technology) an intuitive and visual programming preform for mobile application are development. Stage 1: program for individual mobile user application. Stage 2: build-up Network centralized storage with supervising console operation.
Stage 3: testing system under with 5G network compatibility, bandwidth and network speed is applicable people will be able to use more of the network dedicated to each mobile phone.Finally, successful to apply trial works a fruitful outcome after implementation of the project solution. There was no missing of protection tools on trackside area within the trial period. With the safety-first culture boosted by us, I believe we can achieve a common goal: Everyone Going Home Safe and Well Every day.
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
This is an introductory slide set on the Report JVE Consulting will release by end of Q1 2015. The report is extensive in its IoT introduction, connectivity coverage, IoT applications, security, standards efforts, alliances forming and the views of several market and analyst leaders
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
This is an introductory slide set on the Report JVE Consulting will release by end of Q1 2015. The report is extensive in its IoT introduction, connectivity coverage, IoT applications, security, standards efforts, alliances forming and the views of several market and analyst leaders
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORMIJNSA Journal
Introduction of Smart phones redefined the usage of mobile phones in the communication world. Smart phones are equipped with various sophisticated features such as Wi-Fi, GPS navigation, high resolution camera, touch screen with broadband access which helps the mobile phone users to keep in touch with the modern world. Many of these features are primarily integrated with the mobile operating system which is out of reach to public, by which the users can’t manipulate those features. Google came up with an innovative operation system termed as ANDROID, which is open system architecture with
customizable third party development and debugging environment which helps the user’s to manipulate
the features and to create their own customizable applications.
The research highlights 200 emerging technologies and developments that could have an impact on society and business over the next 10-15 years. The technologies have been grouped under 10 categories:
1. End User Devices, Tools and Trends
2. Interfaces and Displays
3. Internet and Social Media
4. Communications, Collaboration and Networking Tools and Developments
5. Software Tools, Techniques and Trends
6. Artificial Intelligence (AI) and Intelligent Systems
7. Computing Technology and Devices
8. Management and Analysis of Data, Information and Knowledge
9. Security Technology
10. Disruptive Scientific Developments
Designing the Process of Stores Management for Implementing ERP in Manufactur...sushil Choudhary
This paper describes the importance of ERP in manufacturing industries and examines the various articles
published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a
frame work for organizations to better utilize their processes. The report is about windows based application.
The main idea of this paper is to handle the all details of stores management system. In this project software
package has been developed to smoothen the processing of item transaction in stores such as item receive, item
issue & report generation such as stock statement, issue register & receive register etc. This Software will help in
automating all the process like receiving and issuing application in stores.
Robotics - Mainstream or Marginal for Process Industries?Yokogawa1
Whereas robotics have been crucial to factory and warehouse automation for decades, the technology in process industry applications continues to be relatively new and emerging. Savvy operators are realizing the value of robotics in enhancing process safety and efficiency in daily operation and maintenance activities. Robots are performing operator runs in hazardous areas and drones have been deployed on inspections routes in difficult-to-access locations across process complexes. Yet, process operators still face many challenges when it comes to widely adopting robots. How can users integrate robotics into existing operations, control systems and standard operating procedures? Can they use the data collected from robots and combine it with artificial intelligence to provide actionable knowledge? Where do robotics reside on the digital transformation roadmap that ultimately leads to autonomous operations? In this session, participants will learn about Yokogawa's robotics vision, which steps beyond Industry 4.0 and digital transformation to achieve industrial autonomy.
Wearable Computing and Human Computer InterfacesJeffrey Funk
These slides discuss how improvements in ICs, MEMS, cameras, and other electronic components are making wearable computing and new forms of human-computer interfaces economically feasible. Improvements in digital signal processing ICs and MEMS-based microphones are rapidly improving the technical and economical feasibility of voice-recognition based interfaces. Improvements in 2D and 3D image sensors (e.g., camera ICs) are rapidly improving the technical and economical feasibility of gesture-based interfaces, augmented reality, and virtual reality. Improvements in ICs, MEMS, displays and other components are rapidly making many forms of wearable computing economically feasible; these include many forms of head, arm, torso, and leg-mounted displays. Improvements in the materials for both non-invasive and invasive brain scans are rapidly improving the technical and economical feasibility of neural interfaces.
Leveraging mobile devices to enhance the performance and ease of programming ...IJITE
Programming simple robots allows teachers to reinforce unified science, technology, engineering, and
math (STEM) concepts. However, for many educators, the cost and computer requirements for robotics kits
are prohibitive. As mobile devices have become increasingly ubiquitous, low cost, and powerful, they may
prove to be an attractive means of coding for, controlling, and enhancing the capabilities of low-cost
mobile robots. This study looks into the viability of using LEGO Mindstorms NXT and Google Android
devices by using Bluetooth to establish a link between the two. This allows for the exchange of live data
remotely for use in various applications with the hope of creating a low-cost mobile programming
environment. The mobile applications developed were able to successfully exchange data with NXT
hardware via Bluetooth and show evidence that mobile devices can be used as a tool to assist in robotic
programming in education.
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMSIJCSES Journal
Internet of Things is a technological revolution which provides the vision of connected world of Things.Devices, people and systems are connected with one another in such a way that they can communicate with each other over Internet. So the form of communication from human-human is now turned into humanhuman,human-things and things- things. Variety of platforms are now a days available that can support
entire development to deployment of IoT applications and systems. In this paper, we will first start with the introduction of IoT platforms as well as IoT middle ware and then will discuss various IoT platforms,compare various IoT platforms and will end up with the conclusion.
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORMIJNSA Journal
Introduction of Smart phones redefined the usage of mobile phones in the communication world. Smart phones are equipped with various sophisticated features such as Wi-Fi, GPS navigation, high resolution camera, touch screen with broadband access which helps the mobile phone users to keep in touch with the modern world. Many of these features are primarily integrated with the mobile operating system which is out of reach to public, by which the users can’t manipulate those features. Google came up with an innovative operation system termed as ANDROID, which is open system architecture with
customizable third party development and debugging environment which helps the user’s to manipulate
the features and to create their own customizable applications.
The research highlights 200 emerging technologies and developments that could have an impact on society and business over the next 10-15 years. The technologies have been grouped under 10 categories:
1. End User Devices, Tools and Trends
2. Interfaces and Displays
3. Internet and Social Media
4. Communications, Collaboration and Networking Tools and Developments
5. Software Tools, Techniques and Trends
6. Artificial Intelligence (AI) and Intelligent Systems
7. Computing Technology and Devices
8. Management and Analysis of Data, Information and Knowledge
9. Security Technology
10. Disruptive Scientific Developments
Designing the Process of Stores Management for Implementing ERP in Manufactur...sushil Choudhary
This paper describes the importance of ERP in manufacturing industries and examines the various articles
published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a
frame work for organizations to better utilize their processes. The report is about windows based application.
The main idea of this paper is to handle the all details of stores management system. In this project software
package has been developed to smoothen the processing of item transaction in stores such as item receive, item
issue & report generation such as stock statement, issue register & receive register etc. This Software will help in
automating all the process like receiving and issuing application in stores.
Robotics - Mainstream or Marginal for Process Industries?Yokogawa1
Whereas robotics have been crucial to factory and warehouse automation for decades, the technology in process industry applications continues to be relatively new and emerging. Savvy operators are realizing the value of robotics in enhancing process safety and efficiency in daily operation and maintenance activities. Robots are performing operator runs in hazardous areas and drones have been deployed on inspections routes in difficult-to-access locations across process complexes. Yet, process operators still face many challenges when it comes to widely adopting robots. How can users integrate robotics into existing operations, control systems and standard operating procedures? Can they use the data collected from robots and combine it with artificial intelligence to provide actionable knowledge? Where do robotics reside on the digital transformation roadmap that ultimately leads to autonomous operations? In this session, participants will learn about Yokogawa's robotics vision, which steps beyond Industry 4.0 and digital transformation to achieve industrial autonomy.
Wearable Computing and Human Computer InterfacesJeffrey Funk
These slides discuss how improvements in ICs, MEMS, cameras, and other electronic components are making wearable computing and new forms of human-computer interfaces economically feasible. Improvements in digital signal processing ICs and MEMS-based microphones are rapidly improving the technical and economical feasibility of voice-recognition based interfaces. Improvements in 2D and 3D image sensors (e.g., camera ICs) are rapidly improving the technical and economical feasibility of gesture-based interfaces, augmented reality, and virtual reality. Improvements in ICs, MEMS, displays and other components are rapidly making many forms of wearable computing economically feasible; these include many forms of head, arm, torso, and leg-mounted displays. Improvements in the materials for both non-invasive and invasive brain scans are rapidly improving the technical and economical feasibility of neural interfaces.
Leveraging mobile devices to enhance the performance and ease of programming ...IJITE
Programming simple robots allows teachers to reinforce unified science, technology, engineering, and
math (STEM) concepts. However, for many educators, the cost and computer requirements for robotics kits
are prohibitive. As mobile devices have become increasingly ubiquitous, low cost, and powerful, they may
prove to be an attractive means of coding for, controlling, and enhancing the capabilities of low-cost
mobile robots. This study looks into the viability of using LEGO Mindstorms NXT and Google Android
devices by using Bluetooth to establish a link between the two. This allows for the exchange of live data
remotely for use in various applications with the hope of creating a low-cost mobile programming
environment. The mobile applications developed were able to successfully exchange data with NXT
hardware via Bluetooth and show evidence that mobile devices can be used as a tool to assist in robotic
programming in education.
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMSIJCSES Journal
Internet of Things is a technological revolution which provides the vision of connected world of Things.Devices, people and systems are connected with one another in such a way that they can communicate with each other over Internet. So the form of communication from human-human is now turned into humanhuman,human-things and things- things. Variety of platforms are now a days available that can support
entire development to deployment of IoT applications and systems. In this paper, we will first start with the introduction of IoT platforms as well as IoT middle ware and then will discuss various IoT platforms,compare various IoT platforms and will end up with the conclusion.
Software engineering based fault tolerance model for information system in pl...IJECEIAES
The rapid development of mobile phone technologies in recent years promoted them for being used in various areas of life, such as commercial, health, transportation and tourism and other uses. In this paper, a software engineering based fault tolerance model is proposed to manage the expected faults in the adopted servers. The underlying QR based information system in plants shopping center employs different local serves allocated at local shops that are connected to the main server. In a fault case detection at any local server, the main server can cover the management of the system until the maintenance is completed. This is performed in efficient way as the main server keeps a copy of the information for all local branches. It is important to note that the self-checking process is adopted for fault detection. After completing the maintenance, a copy of the updated information is sent back to the investigated local server including all sales, etc. Moreover, the main and local servers contain information about all offer’s plants in different languages and in text and image form, customer's information and admin's information. The proposed system is tested in several cases to prove the efficiency and effectivity in retrieving and managing information and data as well as the fault tolerance administration.
Effective Printing Text using Bluetooth Technology from Android Applicationijtsrd
In communication Bluetooth technology is becoming popular standard, in wireless technologies it is one of the most expeditious growing field. It is very facile to utilize and can meet most of todays injuctive authorizations of mobile and personal communication wireless part of this communication is handled by Bluetooth. Between these contrivances it transmits and receives data. While mobile phone is not just a phone these days. there are no of applications used in mobile wireless printing. its quite popular to print from a mobile applications. this paper aims to do that. in market each of printer company has its own printing application. the main aim of this work is to develop only android application for all printers as to implement real time thermal printing from mobile application even through voice command. Leena Nerkar | Ankita Deore | Priyanka Mali | Mayuri Bahikar"Effective Printing Text using Bluetooth Technology from Android Application" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12915.pdf http://www.ijtsrd.com/engineering/computer-engineering/12915/effective-printing-text-using-bluetooth-technology-from-android-application/leena-nerkar
PRO-VAS: utilizing AR and VSLAM for mobile apps development in visualizing ob...TELKOMNIKA JOURNAL
The development of mobile apps with augmented reality (AR) would enhance the capability in visualizing the scene or environment. Any apps supported by computer aided design versions with 3D models makes the design more realistic, such as in the form of websites or mobile apps. However, the current features for online platforms for shopping are quite limited and lack 3D visualization features. This paper presents the development of a mobile application, pro-visualizer app called PRO-VAS, that utilizes AR for scanning and visualizing the environment. PRO-VAS acts as a product visualizer that applies visual simultaneous localization and mapping (VSLAM) for localization of the product in AR based systems.
The main components of PRO-VAS are ARCore from Google for interactive purposes, and the depth mapping from red green blue depth (RGB-D) phone camera with point plane generator and markerless tracking method. The last component of the app is the set of objects from the unity store, which can be chosen in PRO-VAS for the scanned scene area. The app was tested in various environments involving different objects and has shown competitive results. In the future, more features and products can be added to the apps.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
RAILWAY SAFETY PROTECTION WITH ANDROID MOBILE APPLICATION FOR 5G NEW RADIO NETWORK
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
DOI: 10.5121/ijcsit.2020.12408 89
RAILWAY SAFETY PROTECTION WITH ANDROID
MOBILE APPLICATION FOR 5G NEW RADIO
NETWORK
Tony Tsang and Man Cheng Chong
Centre of International Education, Hong Kong College of Technology,
Hong Kong
ABSTRACT
In every night of non-traffic hours, different jobs are conducting maintenance works in “Railway”
trackside area. This project will explain a specific section of track under the sole control an Engineer’s
Person-in-Charge as procedures. And how to provide protection methods by which a person or persons
on or near a track are safeguarded from potential train movements or a train is safeguarded from other
train movements or obstructions, or persons or equipment are safeguarded from traction
power.Consolidated past several investigation reports and according to related is rules, workflow or
procedures etc. to summarize. There are protection tools left on trackside area incident caused by the
workers are forgetting and poor management. Proposed are different project themes in the light of their
expertise, experience and observation in their daily works. The proposed themes are compared, assessed
and prioritized under the criteria - “Manageable”, “Measurable”, “Result of Benefit”,
“Standardization” and “Priority” in the Decision Matrix. Establish some solve problem methods for
comparing to find out which that lower-cost plan accordingly. I came up with a conclusion and the ideas
as develop a mobile application and create a unique QR code label with equipment naming to facilitate
each worker management of protection tools. This is also fulfilled in popular terms of Creativity and
Innovations. Used the MIT App Inventor (Massachusetts Institute of technology) an intuitive and visual
programming preform for mobile application are development. Stage 1: program for individual mobile
user application. Stage 2: build-up Network centralized storage with supervising console operation.
Stage 3: testing system under with 5G network compatibility, bandwidth and network speed is applicable
people will be able to use more of the network dedicated to each mobile phone.Finally, successful to
apply trial works a fruitful outcome after implementation of the project solution. There was no missing of
protection tools on trackside area within the trial period. With the safety-first culture boosted by us, I
believe we can achieve a common goal: Everyone Going Home Safe and Well Every day.
KEYWORDS
Railway Trackside Safety, QR code, Network Centralized Storage, 5G Mobile Network,
1. INTRODUCTION
“Railway” has been developed very important in city of main public transport service. A safe,
reliable and efficient railway system is paramount importance. Regarding are railway operations
are very busy. Committed high standard maintenance works are able to provide safety,
reliability and excellent service. The Traction power system, Signalling system and Rail
permanent way system etc. must be maintaining relevant regular maintenance works on
trackside area in every night of non-traffic hours. As controllers in railway operations,
managing track access safely is an absolute prerequisite. One of our initiatives is to ensure
protection on track is properly removed on completion of work. When working on track, proper
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
90
protection arrangement must be in places, such as placing Red Flashing Light and Earthing Rod.
And when the work is finished, it is important that the working party must remove all of the
protection arrangement that is applied by them and at the same time, must not remove or
interfare the protection arrangement of other working parties. Safe running of trains after
maintenance works must be ensured all tools were cleared in the trackside area. However, some
protection tools left on track incident become more than frequently. Therefore, the first
passenger train was out of service hit by some about delays, with knock-on effect on road
traffic. There’s really not solved this problem. You’re going to lose money, brand-mark and
reputation. Us did not even realize it the losses could take several different formats.
Despite launching propaganda and promotion to drive safety-first culture, it was disappointing
that Red Flashing Light left on track incidents still happened occasionally. In a time of rapid
growth, we should explore how to further improve the situation. In view of the popularity of
mobile application technology, we proactively designed a mobile application for recording the
application and removal of protection arrangement. With minimal extra workload to the
working parties, the mobile apps can facilitate the checking of proper removal of protection
arrangement by the work parties themselves as well as by the station staff.
The project solution achieves the goal: managing safety in a systematic, proactive and
consistent manner by mitigating risks contributed by human factors. To turn the initiative into
reality, trial was conducted in front line staff and some stations staff with positive feedback.
From the success of the trial, we believe that the project solution can be standardized and
applied to all lines and all locations.
2. METHODOLOGY AND TECHNOLOGY GUIDE
2.1 What is QR Code
QR comes from the abbreviation of “Quick Response” in English. QR code is a two-
dimensional bar code used on mobile phone and designated scanner. It is a matrix block and
white dot or bar graphic. In addition to representing text, graphics, sound and other information
and have large capacity, reliability, confidentiality and anti-counterfeiting of data etc.
Meanwhile, this matrix barcode could be stored biggest digits data or Chinese characters and
also including pictures with audios, etc. Any material surface is not limited to printing with it is
more fault-tolerant to read information completely when QR code slightly damaged. [1]
Photo by http://www.pooito.edu.hk/
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
91
2.2 MIT APP Inventor
MIT APP Inventor is an easy to use visual programming platform that allows everyone persons
and any stage developers to build up dedicated apps for mobile phones and tablets. Due to the
MIT APP Inventor based on blocks-bases tool facilitates to creation. As each apps are
programming to running in less than 30 minutes by MIT APP Inventor introduction. So have a
simple study, develop and start-up application in a smartphone device. And what’s more,
diverse blocks-based tool components to create of complex, high-practical apps significantly
less time than traditional coded programming environments. The MIT APP Inventor project
team seek to software development by authorising all people, to change from technology
consumption to innovation. [2]
Photo by https://appinventor.mit.edu/
2.3 Setting APP Inventor
Layout page will automatically open after Project name is created (Fig.4). Project name in top
left corner of the screen. Left is the (Palette). Middle is the (Viewer) and Right is the
(Components area) where a user was selected or placed components (Fig.5) [3].
Figure 4 Figure 5
Simple of creating components in App Inventor. Just drag anything from the component area to
interface design area. For example, will create a Label component: Drag the Label icon to
mobile interface design area. System could be create different named for recognized a lot of
components. This project will used components as follow:
User interface components [2]
Label: display text
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
92
Button: the main of the application’s interaction with the user. When user pressed the button,
program will be executed to achieve the purpose of interaction.
Text Box: let user enter text and the entered text is stored in the property. The text box is
usually used in conjection with the Button. Allow the user to press the button for subsequent
proceeing after entering text.
Notifer: during execting of the application. It is display some messages to user of the necessary
information. Notification box can automatically disappear after displaying message without
interfering user’s operation. Message can also be displayed in a pop-up dialog box.
Layout components
Very important in interface design of the application. Despite powerful apps but not popular
with users if they have a crude or incompatible interface.
Media components
Player: make the phone vibration and you can set the vibration time. The Player component in
Media category and non-visual component.
Sensors components
Barcorde Scanner: recognizing QR code label.
Storage
TinyDB: database can be used to store data for further processing and analysis in the future.
(Difference of File and TinyDB) File: in the simulator was performed on the simulator or real
machine. Data of File will be cleared every time. Execution will start form the empty database.
TinyDB: TinyDB database provided by App Inventor 2 has been improved to share. So,
performing the simulator or real machine does not clear the data of TinyDB.[4]
Can be displayed on the screen as “visual components”. Some components are not displayed
when they are executed. It should be under “Blocks” program to operation them such are called
“non-visual components”. When dragging a non-visual component to interface desihn area
during in design plase. Will be placed at the icon in invisible area for indicating that nor be
displayed (Fig.7).
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
93
Figure 7
2.4 Block Function
When user makes certain instruction in the interface area, such as pressing a button or entering
text in a Text Box. Will corresponding event be triggered. While executing control in the
program block set by apps designer. The build-in shown on the left side block editing page
contains all system’s built-in program blocks. About area will corresponding and automatically
icon generative under was selected components by designer. When user is selecting any item,
system will list all function block for selection. Events, methods and properties as separate
different type colours for user recognized easily. How to distinguish different function blocks:
Yellow is the Event, Purple is method, Light green is attribute value, Dark green is set attribute
value (Fig.8) [2].
Figure 8
2.5 Programming
2.5.1 Resource Occupation
In oriented programming patterns, “Block” combination is core of program flow necessary.
Designer sets up a situation for which user’s to operate in advance. When the application failed
to operation, will execute a specific code in response. I have set-up infinite “Loop” function and
check at interval time for system to analysis. This method consumes a lot of system resource
and it also difficult to set the clock time (if interval is too short, consumes more than system
resources; if interval is too long, impossible to respond immediately.)
2.5.2 Solve the Resource Occupation
How to solve the problem? Answer is “Event”, processing method is “turn active to passive”.
for example: when system does not actively check whether the button is pressed. So than
resources are not wasted. When button is pressed, system is notified by the pop-up prompted
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
94
title: “Transaction No.” with shown Text Dalog box for user text input. Subsequent, open
another screen with start value after user was input transaction number in Text Dalog box (Fig.
9) [4].
Figure 9
Usually events consist as follow:
1. Event source: the component that triggered the event, such as Button, Text Box, etc.
2. Event Name: the event that occurred, such as Click, Got Focus, etc.
3. Processing code: A piece of program that is executed after the event.
2.5.3 Access variable value
There are two ways to access variable value in the program: first method is to move the mouse
over the declared variable name. after tile to get and set the variable will be displayed. Click the
mouse on the tile Lift click add tile to edit area. Second method is seclect Variable in Built-in
item. Then click Get or Set tile and then click variable to be used in drop-down meun to edit
area (Fig. 10) [5].
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
95
Figure 10
2.6 Conditional Expression
Program is usually executed is sequentially. That is according to code by code or one by one
step. But sometimes different code need to be complexity situations. The principle is based on
conditional expression. Despite the operations are usually used as Comparisons or Logical for
calculation. however, both formula such as return True or False.
Comparison operation compares two different items. If compare is correct, it return is true. If
compare is incorrect, it return is false. Designer as according different process to a comparison
result (Fig. 11).
Figure 11
Logiccal operation is combination of multiple comparison to obtain the final result. Which is
usually used in more complex situations. There are 4 pieces as “Not, And, Or, Equal” (Fig. 12)
[5].
Figure 12
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
96
2.7 If-Then-Else Expressions
If-Then: Check the specified conditional expression. When the conditional shown is true,
program block in formula will be executed. If opposite, the one-way block will ended
immediately.
If-Then-Else: one-way block function is imperfection. Multiple-way block is created by
expanding “Else” icon in the one-way tile. (Fig.13,14) [5]
Figure 13
Figure 14
5.8 Database
Used database to store data that it can be further processed and analyzed such as more advanced
for the application. App Inventor 2 provided TinyDB for storages data in simulator and
smartphone. Please note that only provide APK file installation could be used build-in project-
specific TinyDB database for each project. If start up on emulator or a device built-in emulator,
it should be temporary stored in shared file. (Fig.15,16) [5, page 234].
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
97
Figure 15
Figure 16: TinyDB as non-visible components
2.9 Network Database Storge
FirebaseDB – undoubtedly become the backend as a service (BaaS) platform for app developers.
FiredaseDB is a simultaneous support to Android, IOS and webpage with cloud development
platform. Provide real-time data synchronized database in server, it can be effective to reduce
developing time and assist developers to reinforce in front-end optimization. Main core and
three categoies of functions:
1. Firebase Analytics: powerful unlimited data analysis function is the core of products. It
have currently free to use with 500 types unlimited records, also setup the customize
key event and user attributes. The visual dashboard allow users to monitoring all the
important user behaviors and performance analysis of marketing strategy.
2. Develop: provide safe and effective back-end service including is Realtime database,
Authentication, Cloud Messaging, Hosting, Strage and Remote configuration. Test Lab
for Android and Crash Reporting that functions let developers easily to test app in
diffierent operation system with under hardware performance. Quickly found any
problem and keep systam operation normally.
3. Grow: easy to set-up message notifications, App Indexing, Dynamic Links and Email
Invites function. Integrated of Google AdWords app behavior data, allowing app
developers to provide more then accurate advertising or communication messages to
target customer.
4. Earn: consolidated with self product’s AdMod can join advertising network in easily
place to slots. As well as diversified advertising formats with tracking mechanisms. [6]
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
98
(Photo by Firebase)
Set-up the component attribute parameter is enx313-2019 to be label used in Realtime Database.
Three categories must be corresponding with App Inventor in FirebaseDB properties:
1. Firebase Token: Authentication credentials are used to identify all users that is an
application or website.
2. Firebase URL: Uniform Resource Locator is unique and there will not be two. So that it
connected between with each mobile device for communication.
3. Project Bucket: tags your application value will be stored of folder. [7]
Network flow monitoring: automatically measure the network capacity in characteristics of your
apps. About data collected with user’s behaviours and methods that can understand where and
when the performance of mobile apps improvement. (Fig.17) [8]
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
99
Figure 17
2.10 Mobile Application Testing and Detect Founding
Users can create or retrieve a record in the mobile apps by inputting the transaction number or
work order of their work. Under each record, users can register the application and removal of
several items for a work. Each item is identified by a coding plate with a per-set unique QR
code (QR code can be generated in web page: https://www.qr-code-generator.com/ which is to
be scanned by the mobile phone through the mobile apps for record. [1]
(1) Press {Transaction No.} (2) Press [OK] after number inputted (3) Show scan button after
item selected
Main page Notification box Record page
(4) QR code scanning (5) unique QR code (6) Incorrect item (7) Correct item scan
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
100
In this trial processing, I found some defective will affect to test result as below:
1. Un-charged battery for the mobile phone.
2. Standard QR nameplate for equipment were not fixed in surface.
3. in dark environment to scanned QR code.
2.11 Network Monitoring
Firebase with App Inventor is archiving between System Controllers to users both side
communications. The system controller can be comprehensive to monitoring all place in
trackside equipment. According the Firebase data records to identify protection item was
removed. (Fig. 18)
Figure 18
2.12 Supervision Result
As the above network supervision result, I would be ensured that communicate between
Firebase with Apps Inventor are synchroniy it should have successfully. The Competent Person
(CP) / Engineering Possession In-Charge (EPIC) before access to track side. Who will be
13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
101
inform with System Controller correctly activaties after conducting anything protection
equipment place, apply or remove about correctly behaviors. System controller accordance the
network result to keep close monitoring. Meanwhile, it could be summarize, analysis and
statistics various workship is periodic after when collected relevant data in server.
2.13 5G Network
The newly fifth-generation (5G) mobile service [11,12] spectrum released plan for 2020-2022
was published in January 2020 by Communications Authority of Hong Kong. Will release a
maximum value of 160 MHz in the 600/700 MHz bands and 80 MHz in the 4.9 GHz bands to
market in 2021. Simultaneously continue to supply more than spectrum and facilitate public
mobility development of service. Besides, 2900MHz spectrum is available for assignment in
26/28 GHz bands. Recently, some industry of mobility companies introduced more next series
in which one model 5G mobile phone should be applicable network in Hong Kong. [9]
Although the international have not been definition for 5G. It can roughly cover as two
mainstream frequency bands. Sub 6GHz (that is below 6GHz) which no different from the 4G
LTE frequency band have currently to use. Another is up 24GHz above is “millimeter wave”
frequency band that is often heard recently. The 5G network are combines in existing 4G LTE
frequency band and with a heterogeneous network (HetNet). Through the main speed of
millimeter wave (mmWave) broadband technology and with low-power, wide-covering (sub
6GHz narrow-band technology). It provides most suitable wireless network in different
environments to meet the short/long distance Communication requirements. Also, concepts of
5G included as follow:
Small cell: smaller cell equivalent to coverage of 4G LTE. The electromagnetic wave’s
diffraction ability becomes stronger.
Multiple-Input Multiple-Output (Massive MIMO): more transmitter with more receiver for
maintains faster speed data transmitting.
Beamforming: the technology of directional signals converts to existing coverage into precise.
Through the superposition of transmitting or receiving in a specific directional device. Which
not only extends transmission distance but also significantly reduce signal interference. [10]
( Photo by [10])
Against at railway situation, track area including tunnel, over ground, viaduct, bridge and
remote hinterland area. Must be use stable with reliable communication system to enhance our
coordination work. Therefore, the 5G network such as very well with this development system.
14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
102
3. CONCLUSIONS
3.1 Conclusions
In this project earlier, I was proposed two-stage as phase one mobile apps development with
phase two are cloud network storage. However, in accordance with my Project supervisor’s, Dr
Tony Tsang from Hong Kong College of Technology is more than discussion, study and
experience sharing. He has suggested that the project had including new mobile network
technology to rise up performance and reliability. Furthermore, he has reminded me the cloud
storage data is part of big data information. It could make the most of data to modify my
application while is user’s incorrect operation. I very appreciated his professional and ideas.
Due to me unfamiliar with system development logic. So as mobile phone show black page
repeatedly when activating camera in processing the App Inventor program. Through something
that research in library, web search and rich experiences programmer’s explanation.
Successfully to activated camera to recognize the QR code. TinyDB database is a difficult
problem is when “Tag” mismatch in text box. After should be affected save and reload data at
text box. Worse caused the system take up more memory and resources. I tried to use the
transaction number as “Tag” in front of file name for separate to save each file accordingly. The
Firedase is very easy development database storage system. However, against large data or
complex user behaviours are very difficult to process and analysis. As considered cost/facility
of preparing servers, operating systems, and database management systems are expensive. A
free version of Firebase supports fewer than 100 connections at same time. A number of 100
network connections is satisfaction for majority of apps.
Finally, I have the honour with gratitude depot teams and station front line team’s colleagues to
support. During the trial test, mostly give us their comment/feedback. Accordance with their
operating app's behaviours records. Let me a comprehensive modification of the interface or
notification box optimisation.
The project was considered successful with my achieved the goal “Line Clear” with details as
follow:
1. To reduce the incident relating red flashing light in track.
2. As safety, affective and reliable service can be provided through continual improvement
of our systems. The approach to reducing incident relating red flashing light left in track
may be extended to other systems in maintaining a safe environment to staff.
3. The project solution is result of the joint efforts in delivering better service to both
internal and external customers.
3.2 Recommendation
Currently, frontline maintenance staff in normally provide with duty smartphone which is
actually the required tool for installation of mobile apps. This phone can actually serve as a
tool/reminder for reducing incidents. The previous trial proved that the mobile apps can
effectively ensure the removal of protection arrangement upon completion of work. Thus, I
should proceed with standardization in the aspects:
15. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
103
1. Implement on Corporation
I would like to recommend using mobile apps to record the application/removal of red flashing
light on all train service lines such that the completion of this critical task can be verified under
relevant controllers.
2. Extent the application
If the process is proved to be effective, I would explore to extent its applications including to
applying portable earth, safety padlock, barriers and possibly other important matters. Further
improvement of the system can be considered in one possible direction is to develop a
centralized database system to:
1. Works for single possession with multiple inputs, e.g. several work teams to prepare
protections at a different location, possession granted.
2. Create an assignment by the system, team members to follow the assigned duty and
confirm accordingly. The system will validate the correctness and completeness.
3. Link with official system
The work involving track access is normally recorded in official system. If such mobile
application can link with official system. The record can only be finished when all protection
arrangements have been removed. In other words, concerned risk can further be mitigated and
almost eliminated.
REFERENCES
[1] Egoditor, QR Code Generator. Available from: Web site: https://www.qr-code-generator.com/
[Accessed: January 12, 2020].
[2] (https://appinventor.mit.edu/) Massachusetts Institute of Technology (2012), MIT App Inventor.
Available from: Massachusetts Institute of Technology, Computer Science and Artificial
Intelligence Laboratory Web site: https://appinventor.mit.edu/ [Accessed: February 2, 2020].
[3] Jason, Tyler (2011), App inventor for Android: build your own apps-- no experience required,
Chichester, UK.
[4] 鄧文淵&李淑玲 (2015), App inventor of database project, Gotop, Taipei, Taiwan.
[5] 鄧文淵&李淑玲 (2014), App inventor of basic, Gotop, Taipei, Taiwan.
[6] Alpha Camp, What's Firebase. Available from: Web site: https://tw.alphacamp.co/blog/2016-07-
22-firebase [Accessed: January 10, 2020].
[7] Chih-hung Wu, Firebase.pptx. Available from: National TaiChung University of Education,
Dept. of Digital Content and Technology Web site:
http://120.108.221.55/profchwu/dctai/%E6%95%99%E6%9D%90/App%20Inventor/Firebase%
E8%B3%87%E6%96%99%E5%BA%AB/firebase.pdf [Accessed: January 23, 2020].
[8] Google, Product. Available from: Web site: https://firebase.google.com/ [Accessed: December
24, 2019].
[9] Ben Sin (2019), First impressions of LG G8 and V50: 5G-ready and a second screen or infrared
palm unlock. Available from: Web site:
https://www.scmp.com/lifestyle/gadgets/article/2187684/first-impressions-lg-g8-and-v50-5g-
ready-and-second-screen-or [Accessed: January 23, 2020].
[10] 蕭佑和 Youhesiao (2019), 只要 9 張圖,看懂什麼是 5G. Available from: Web site:
https://meethub.bnext.com.tw/%E3%80%905g%E7%A7%91%E6%99%AE%E3%80%91%E5
%8F%AA%E8%A6%819%E5%BC%B5%E5%9C%96%EF%BC%8C%E7%9C%8B%E6%87
%82%E4%BB%80%E9%BA%BC%E6%98%AF5g%EF%BD%9C%E5%A4%A7%E5%92%8
C%E6%9C%89%E8%A9%B1%E8%AA%AA/ [Accessed: January 7, 2020].
16. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
104
[11] 5G Infrastructure Public Private Partnership (5G PPP), “Business Validation in 5G PPP vertical
use cases”, 5G Infrastructure AssociationVision and Societal Challenges Working Group
Business Validation, Models, and Ecosystems Sub-Group, <https://5g-ppp.eu/white-
papers/>[Accessed: June, 2020].
[12] 5G CISCO, <https://www.cisco.com/c/dam/global/zh_cn/solutions/service-
provider/5g/pdf/index.html> [Accessed: July 2020].
AUTHORS
Tony Tsang (MIEEE’2000) received the BEng degree in Electronics & Electrical
Engineering with First Class Honours in U.K., in 1992. He studied the Master
Degree in Computation from Computing Laboratory, Oxford University (U.K.) in
1995. He received the Ph.D from the La Trobe University (Australia) in 2000. He
was awarded the La Trobe University Post-graduation Scholarship in 1998. He
works in Hong Kong Polytechnic University as Lecturer since 2001. He works in
Hong Kong College of Technology in 2014. He has numerous publications (more
than 110 articles) in international journals and conferences and is a technical
reviewer for several international journals and conferences. His research interests
include mobile computing, networking, protocol engineering and formal methods.
Dr. Tsang is a member of the IET and the IEEE.