A low cost Internet-based attendance record embedded system for students which uses wireless technology to
transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a
client which stores the details of the students in the database by using user login system using web. When the user logs
into the database the data is sent through GPRS to the server machine which maintains the records of the employees and
the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer
between the client and server. This system can be implemented to any real time application so as to retrieve information
from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the
limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is
transferred in a secure way from the client database and updated in the server database using GPRS technology
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...Editor IJCATR
In this paper we proposed advanced technologies to provide tremendous support for network administrators by implementing a secure remote system administration app that runs on android smartphones to aid them administer their servers remotely when they (network administrators) are out stationed using their smartphones.
The android app developed in eclipse establishes a secure connection with a remote server running a PHP application. The app was developed based on the Remote Frame Buffer (RFB) protocol. The RFB protocol, a display protocol has some security lapses including being vulnerable to Man-In-The-Middle (MITM) attack using a few tools and techniques. This research therefore incorporated a self-signed Secure Socket Layer (SSL) certificate in the android app to enable secure encrypted connections to be established between the android app and the remote server to ensure end-to-end security against attacks such as Man-In-The-Middle (MITM).
The whole system was deployed based on client-server architecture with the hand-held smart devices as clients, providing real-time network access to network administrators to their remote servers.
The secure RFB protocol proposed and implemented in the android app was compared with other existing software for remote system administration such as Remote Desktop (RDP), and RFB protocols using ICMP ping command. The results show that the average response time of the RDP protocol was 436ms, that of the RFB protocol was 496ms and that of the android app which is based on a proposed secure RFB protocol was 474ms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Development of A web and GSM Based Monitoring and Controlling System for PLC ...ijsrd.com
In this paper we have developed a platform to remotely monitor and control PLC-based processes over web and GSM network. It will be great benefit if we control the process plant through remote monitoring and controlling. In recent years the development of industrial automation through remote monitoring and controlling has been increased. The proposed system is made possible by the use of PLC, Microcontroller, GSM modem, Ethernet Module, and other elements. The main aim of the remote monitoring and controlling is when a critical failure occurs notifications are generated and send to the expert via SMS and internet message with the help of GSM modem and through internet. The remote controlling of process is now much required control to use expert man power. The challenge here is to establish a proper serial and Ethernet communication between PLC and Microcontroller via appropriate protocol and also to integrate conventional process with recent communication technologies along with advancements in wireless and internet technology.
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...Editor IJCATR
In this paper we proposed advanced technologies to provide tremendous support for network administrators by implementing a secure remote system administration app that runs on android smartphones to aid them administer their servers remotely when they (network administrators) are out stationed using their smartphones.
The android app developed in eclipse establishes a secure connection with a remote server running a PHP application. The app was developed based on the Remote Frame Buffer (RFB) protocol. The RFB protocol, a display protocol has some security lapses including being vulnerable to Man-In-The-Middle (MITM) attack using a few tools and techniques. This research therefore incorporated a self-signed Secure Socket Layer (SSL) certificate in the android app to enable secure encrypted connections to be established between the android app and the remote server to ensure end-to-end security against attacks such as Man-In-The-Middle (MITM).
The whole system was deployed based on client-server architecture with the hand-held smart devices as clients, providing real-time network access to network administrators to their remote servers.
The secure RFB protocol proposed and implemented in the android app was compared with other existing software for remote system administration such as Remote Desktop (RDP), and RFB protocols using ICMP ping command. The results show that the average response time of the RDP protocol was 436ms, that of the RFB protocol was 496ms and that of the android app which is based on a proposed secure RFB protocol was 474ms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Development of A web and GSM Based Monitoring and Controlling System for PLC ...ijsrd.com
In this paper we have developed a platform to remotely monitor and control PLC-based processes over web and GSM network. It will be great benefit if we control the process plant through remote monitoring and controlling. In recent years the development of industrial automation through remote monitoring and controlling has been increased. The proposed system is made possible by the use of PLC, Microcontroller, GSM modem, Ethernet Module, and other elements. The main aim of the remote monitoring and controlling is when a critical failure occurs notifications are generated and send to the expert via SMS and internet message with the help of GSM modem and through internet. The remote controlling of process is now much required control to use expert man power. The challenge here is to establish a proper serial and Ethernet communication between PLC and Microcontroller via appropriate protocol and also to integrate conventional process with recent communication technologies along with advancements in wireless and internet technology.
EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORKIJNSA Journal
IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voice transmission. It provides a real convergence of various networks. This voice transmission technology does not support a quality that is equivalent to digitized voice, which is available in the existing PSTN networks. In addition to this, data network vulnerabilities affect the VOIP service causing a drop in the utilization of voice communication. In this paper, the quality of service for voice calls is ensured with the integration of CAC mechanism with the bandwidth link utilization which makes an estimation of the demanded bandwidth. In terms of security, prevention of ARP cache poisoning attack is achieved by use of the signed MAC address response in local area networks. It makes the network confident that the admitted user is an authorized user and also it verifies that only the authorized users’ information is exchanged over the local area network. Also an approach that makes it difficult for the hacker’s to hack the data exchanged over the quality channel has been proposed.
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Tal Lavian Ph.D.
We are facing a trend towards ubiquitous connectivity where users demand access at anytime, anywhere. This has lead to the deployment of public network ports and wireless networks. Current solutions to network access control are in exible and only provide all-or-nothing access. It is also increasing important to protect Intranet hosts from other mobile and static hosts on the same
Intranet, in order to contain damages in the case that a host gets compromised. We present an architecture that addresses these issues by using a programmable router to provide dynamic
ne-grained network access control. The Javaenabled router dynamically generates and enforces
access control rules using policies and user proles as input, reducing administrative overhead. Our modular design integrates well with existing authentication and directory servers, further reducing admininstrative costs. Our prototype is implemented using Nortel's Accelar router and moves users to VLANs with the appropriate access privilege.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
This work explores the possibility of transferring data between mobile devices that are nearby each other without the need of pairing, authentication, superuser access and Internet connectivity. Such technology can be used for emergency broadcast, traffic congestion avoidance, IoT, smart city, social and dating systems and games. Except Bluetooth Low Energy technology, there is no other protocol or technology available that allows pairing-free data transfer without Internet connectivity. Bluetooth Low Energy is capable of doing so but at a relatively short range. Using Wi-Fi Direct's Service Broadcast and Discovery, a simple yet novel method is developed which allows for seamless long range (Wi-Fi range) data transfer without Internet connectivity.
The design details of FATS-mumble can be found in the paper (http://www.comp.nus.edu.sg/~bhojan/papers/mumble15.pdf) published in ACM Mobicom 2015 SmartObjects. Please use it for all the references of this mumble project.
The project is open sourced (Github Link): https://github.com/FatsGW/FATS-Mumble.
Demo: http://youtu.be/ACmNYLd2NlI
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...Oliver Pfaff
Presence- und Instant-Messaging-Programme wie AOL Instant Messenger sowie ICQ, Microsoft Messenger und Yahoo Messenger erfreuen sich einer stark steigenden Nutzung – insbesondere auch am Arbeitsplatz. Deren Nutzung führt jedoch zu erheblichen Bedro-hungsszenarien für die Unternehmenssicherheit. Richtig eingesetzt können IT-basierte Echt-zeitkommunikationssysteme jedoch signifikante Effizienzpotenziale für Unternehmen er-schließen.
Daher ist die Realisierung geeigneter Lösungsarchitekturen von zentraler Bedeutung bei der Einführung von IT-basierten Echtzeitkommunikationsdiensten in Unternehmensnetzen. Die-ser Vortrag erörtert die gegebenen Bedrohungen, untersucht Gegenmaßnahmen und skiz-ziert Architekturen für die sichere Nutzung solcher Dienste.
This list contains latest IEEE project abstracts based on Raspberry Pi and ARM processor for Electronics and communication, Electronics and Instrumentation, Electrical and Electronics, Information Technology students. This list contains few abstracts only. For more abstracts based on Embedded, Biomedical, Matlab, NS2, VLSI, Java, Android, .NET, PHP, visit www.softroniics.in or Call 9037291113
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
Abstract: With an increase in the population of aged people with health issues, nowadays the significance of ECG based remote patient monitoring system as a point of care (PoC) application in the hospitals is getting increased. Patient ECG signal and other physiological information like body temperature, blood pressure, and glucose level, etc., collected by the body sensor networks will be transmitted to the central hospital servers. After processing this information, the system sends the alerts to the doctors if any abnormal condition arises. The major problem with this scenario is, the confidentiality of these information must be potted while the transmission over public channel and storing in the hospital servers. In this paper, an ECG steganography based cryptographic technique is proposed to preserve the confidentiality of the information. The proposed algorithm conceals the encrypted patients’ information in the ECG signal without affecting the quality of that signal. It uses the cryptography and ECG steganography techniques to preserve the confidentiality of the patients’ information. The effectiveness of the proposed algorithm is evaluated by comparing with the existing algorithms. It is proved that the proposed algorithm is more secure with high processing speed and low distortion of data and host ECG signal.
Smart Sensor Configuration for Security System Automation Using FPGAIJTET Journal
Abstract--- Automation in industrial control and monitoring systems plays a vital role in maintaining smooth work environment and handling perilous situation that may occur in work area. The available systems mostly use physical cables for signal transfer between the sensors and the control system. These systems have some significant problems such as the cable installation and maintenance costs associated with moving and replacement of cables during machinery maintenance, configuration and re-configuration. While the technological evolution of sensors is reflected in sensors getting smart, small, light weight, and cheapest, another key development is taking place in the sensors industry in the growth of wireless sensor use in industrial applications. The proposed wireless sensor-based controls provide industry attention in order to reduce costs, better power management and ease in maintenance. Wireless sensors have been successfully implemented in many industrial applications because of its performance, monitoring, security development and control the sensor system etc.
EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORKIJNSA Journal
IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voice transmission. It provides a real convergence of various networks. This voice transmission technology does not support a quality that is equivalent to digitized voice, which is available in the existing PSTN networks. In addition to this, data network vulnerabilities affect the VOIP service causing a drop in the utilization of voice communication. In this paper, the quality of service for voice calls is ensured with the integration of CAC mechanism with the bandwidth link utilization which makes an estimation of the demanded bandwidth. In terms of security, prevention of ARP cache poisoning attack is achieved by use of the signed MAC address response in local area networks. It makes the network confident that the admitted user is an authorized user and also it verifies that only the authorized users’ information is exchanged over the local area network. Also an approach that makes it difficult for the hacker’s to hack the data exchanged over the quality channel has been proposed.
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Tal Lavian Ph.D.
We are facing a trend towards ubiquitous connectivity where users demand access at anytime, anywhere. This has lead to the deployment of public network ports and wireless networks. Current solutions to network access control are in exible and only provide all-or-nothing access. It is also increasing important to protect Intranet hosts from other mobile and static hosts on the same
Intranet, in order to contain damages in the case that a host gets compromised. We present an architecture that addresses these issues by using a programmable router to provide dynamic
ne-grained network access control. The Javaenabled router dynamically generates and enforces
access control rules using policies and user proles as input, reducing administrative overhead. Our modular design integrates well with existing authentication and directory servers, further reducing admininstrative costs. Our prototype is implemented using Nortel's Accelar router and moves users to VLANs with the appropriate access privilege.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
This work explores the possibility of transferring data between mobile devices that are nearby each other without the need of pairing, authentication, superuser access and Internet connectivity. Such technology can be used for emergency broadcast, traffic congestion avoidance, IoT, smart city, social and dating systems and games. Except Bluetooth Low Energy technology, there is no other protocol or technology available that allows pairing-free data transfer without Internet connectivity. Bluetooth Low Energy is capable of doing so but at a relatively short range. Using Wi-Fi Direct's Service Broadcast and Discovery, a simple yet novel method is developed which allows for seamless long range (Wi-Fi range) data transfer without Internet connectivity.
The design details of FATS-mumble can be found in the paper (http://www.comp.nus.edu.sg/~bhojan/papers/mumble15.pdf) published in ACM Mobicom 2015 SmartObjects. Please use it for all the references of this mumble project.
The project is open sourced (Github Link): https://github.com/FatsGW/FATS-Mumble.
Demo: http://youtu.be/ACmNYLd2NlI
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...Oliver Pfaff
Presence- und Instant-Messaging-Programme wie AOL Instant Messenger sowie ICQ, Microsoft Messenger und Yahoo Messenger erfreuen sich einer stark steigenden Nutzung – insbesondere auch am Arbeitsplatz. Deren Nutzung führt jedoch zu erheblichen Bedro-hungsszenarien für die Unternehmenssicherheit. Richtig eingesetzt können IT-basierte Echt-zeitkommunikationssysteme jedoch signifikante Effizienzpotenziale für Unternehmen er-schließen.
Daher ist die Realisierung geeigneter Lösungsarchitekturen von zentraler Bedeutung bei der Einführung von IT-basierten Echtzeitkommunikationsdiensten in Unternehmensnetzen. Die-ser Vortrag erörtert die gegebenen Bedrohungen, untersucht Gegenmaßnahmen und skiz-ziert Architekturen für die sichere Nutzung solcher Dienste.
This list contains latest IEEE project abstracts based on Raspberry Pi and ARM processor for Electronics and communication, Electronics and Instrumentation, Electrical and Electronics, Information Technology students. This list contains few abstracts only. For more abstracts based on Embedded, Biomedical, Matlab, NS2, VLSI, Java, Android, .NET, PHP, visit www.softroniics.in or Call 9037291113
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
Abstract: With an increase in the population of aged people with health issues, nowadays the significance of ECG based remote patient monitoring system as a point of care (PoC) application in the hospitals is getting increased. Patient ECG signal and other physiological information like body temperature, blood pressure, and glucose level, etc., collected by the body sensor networks will be transmitted to the central hospital servers. After processing this information, the system sends the alerts to the doctors if any abnormal condition arises. The major problem with this scenario is, the confidentiality of these information must be potted while the transmission over public channel and storing in the hospital servers. In this paper, an ECG steganography based cryptographic technique is proposed to preserve the confidentiality of the information. The proposed algorithm conceals the encrypted patients’ information in the ECG signal without affecting the quality of that signal. It uses the cryptography and ECG steganography techniques to preserve the confidentiality of the patients’ information. The effectiveness of the proposed algorithm is evaluated by comparing with the existing algorithms. It is proved that the proposed algorithm is more secure with high processing speed and low distortion of data and host ECG signal.
Smart Sensor Configuration for Security System Automation Using FPGAIJTET Journal
Abstract--- Automation in industrial control and monitoring systems plays a vital role in maintaining smooth work environment and handling perilous situation that may occur in work area. The available systems mostly use physical cables for signal transfer between the sensors and the control system. These systems have some significant problems such as the cable installation and maintenance costs associated with moving and replacement of cables during machinery maintenance, configuration and re-configuration. While the technological evolution of sensors is reflected in sensors getting smart, small, light weight, and cheapest, another key development is taking place in the sensors industry in the growth of wireless sensor use in industrial applications. The proposed wireless sensor-based controls provide industry attention in order to reduce costs, better power management and ease in maintenance. Wireless sensors have been successfully implemented in many industrial applications because of its performance, monitoring, security development and control the sensor system etc.
Seminar report on Raspberry Pi, submitted in SEMINAR subject of GTU Gujarat Technological University by Nipun Parikh from Bhagwan Mahavir College of Engineering & Technology
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...IJTET Journal
Day by day the scope of networked embedded system is rapidly increasing for monitoring & controlling either home
appliances or industry devices. The World Wide Web is a global system of interconnected computer networks that utilizes the
standard Internet Protocol Suite (TCP/IP) and allows the user to interface many real-time Embedded applications similar to data
acquisition, Industrial automations and safety measures etc,. Users can monitor & control remote machines/systems by using an
embedded web server. The main objective of this system is used to monitor the industrial parameters and control the various
machines/systems in the industry from anywhere in the world through embedded web server. The machine/instrument is
monitored and controlled by ARM 7 and in-build web server with GPRS technology. Various sensor’s are used to monitor the
parameters like pressure, speed and temperature in the industry. A relay is used in this system to control the machine/instrument
by giving ON/OFF command in the web page. The embedded device communicates through General Packet Radio Service
(GPRS). GPRS technology along with GSM can be accessed from anywhere in the world.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
ABSTRACT: Design of on-line embedded web server is a one of the difficult task of many real time data acquisition and control system applications. The global system of interconnected computer networks is called as World Wide Web which uses the standard Internet Protocol Suite (TCP/IP) to aid billion of users worldwide and enables the user to interface many real time embedded applications like data acquisition,Industrial automations and safety measures etc,. This paper tells the design and development of on-line Interactive Data Acquisition and Control System (IDACS) using ARM9 based embedded web server. It is permitted to a network, intelligent and digital distributed control system. Single chip IDACS method increses the processing speed of a system and also avoids the problem of poor real time and reliability.This system uses ARM9 Processor and RTLinux. Web server application is ported into an ARM processor using embedded ‘C’ language. Web pages are designed in Hyper text markup language (HTML). Keywords - Embedded ARM9 Processor, RTLinux RTOS, Embedded web server, IDACS.
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
Design of on-line embedded web server is a one of the difficult task of many real time data
acquisition and control system applications. The global system of interconnected computer networks is called as
World Wide Web which uses the standard Internet Protocol Suite (TCP/IP) to aid billion of users worldwide and
enables the user to interface many real time embedded applications like data acquisition,Industrial automations
and safety measures etc,. This paper tells the design and development of on-line Interactive Data Acquisition
and Control System (IDACS) using ARM9 based embedded web server. It is permitted to a network, intelligent
and digital distributed control system. Single chip IDACS method increses the processing speed of a system and
also avoids the problem of poor real time and reliability.This system uses ARM9 Processor and RTLinux. Web
server application is ported into an ARM processor using embedded ‘C’ language. Web pages are designed in
Hyper text markup language (HTML)
Home Automation System using ZigBee and PandaBoard as a Gateway (HAS-ZP)idescitation
Today’s homes have as many wires as the number of devices to control. Home
automation using ZigBee and PandaBoard as a gateway does away with the need for
separate wires and even remotes. The wireless home area network doesn’t require line-of-
sight communication. The HAS-ZP is a wireless home automation system that can be
implemented in existing home environments, without any changes in the infrastructure.
Home Automation lets the user control the home appliances from his or her smart-phone or
laptop. The assigned actions can happen depending on time or other sensor readings such as
light, temperature or sound from any connected device in the Home Automation network.
With the help of PandaBoard, currently working as gateway, we can control, command,
operate and observe the end devices. Here we are considering end devices like fan, bulb, TV,
Music System, doors, windows etc. with the single gateway, the system can control entire
home irrespective of number of rooms or boundaries where each room will be connected
with single receiver.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...Editor IJCATR
In this paper we proposed advanced technologies to provide tremendous support for network administrators by
implementing a secure remote system administration app that runs on android smartphones to aid them administer their servers
remotely when they (network administrators) are out stationed using their smartphones.
The android app developed in eclipse establishes a secure connection with a remote server running a PHP application. The app was
developed based on the Remote Frame Buffer (RFB) protocol. The RFB protocol, a display protocol has some security lapses
including being vulnerable to Man-In-The-Middle (MITM) attack using a few tools and techniques. This research therefore
incorporated a self-signed Secure Socket Layer (SSL) certificate in the android app to enable secure encrypted connections to be
established between the android app and the remote server to ensure end-to-end security against attacks such as Man-In-The-Middle
(MITM).
The whole system was deployed based on client-server architecture with the hand-held smart devices as clients, providing real-time
network access to network administrators to their remote servers.
The secure RFB protocol proposed and implemented in the android app was compared with other existing software for remote system
administration such as Remote Desktop (RDP), and RFB protocols using ICMP ping command. The results show that the average
response time of the RDP protocol was 436ms, that of the RFB protocol was 496ms and that of the android app which is based on a
proposed secure RFB protocol was 474ms.
Comparative analysis of traditional scada systems and io t implemented scadaIJARIIT
SCADA system stands as an abbreviation of Supervisory Control and Data Acquisition. It focuses on the supervisory
level and is not a full control system. It is a computer system which gathers and analyses real time data. They are useful in
monitoring and controlling a plant or industrial equipment like telecommunications, water, waste control, energy, oil-gas
refining, and transportation. It gathers information about a mishap, transfers it back to a central site and alerts the home station
about the mishap, carries out necessary analysis and control, like determining if the mishap occurred is critical, and display the
information in a logical and organized fashion. They can be relatively as simple as a system which monitors environmental
conditions of a small office building, or as complex as a system that monitors all the activity in a nuclear power plant.
IOT acts as a complementary setup to SCADA. SCADA system generates information which acts as one of the data sources for
IOT. While the focus of SCADA on monitoring and control, the focus of IOT is firmly on analyzing machine data to improve
productivity.
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...ijasuc
The advent of cloud computing has driven away the notion of having sophisticated hardware devices for
performing computing intensive tasks. This feature is very essential for resource-constrained devices. In
mobile cloud computing, it is sufficient that the device be a thin client i.e. which concentrates solely on
providing a graphical user interface to the end-user and the processing is done in the cloud. We focus on
adaptive display virtualization where the display updates are computed in advance using synchronization
techniques and classifying the job as computationally intensive or not based on the complexity of the
program and the interaction pattern. Based on application, the next possible key-press is identified and
those particular frames are pre-fetched into the local buffer. Based on these two factors, a decision is
then made whether to execute the job locally or in the cloud or whether we must take the next frame from
the local buffer or pull it from server. Jobs requiring greater interaction are executed locally in the
mobile to reduce interaction delay. If a job is to be executed in the cloud, then the results of the
processing alone are sent via the network to the device. The parameters are varied in runtime based on
network conditions and application parameters to minimise the interaction delay.
Beaglebone Black Webcam Server For SecurityIJTET Journal
Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system
is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced
with webcam. The client can access the web server by proper authentication. The web server displays the web page forms
like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page
displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client
to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project
Biometrics Authentication Using Raspberry PiIJTET Journal
Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time
applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem.
This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management
using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were
entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the
fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the
database (postgresql) to show the capability of this model.
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
Number of techniques has been planned supported packet secret writing to safeguard the
communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic.
STARS discover the relationships of offer to destination communication. To forestall STAR attack associate
offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution.
that's the probability for each node to entire traffic captured with link details message source/destination and
conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be
associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the
end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack.
Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of
sweetening to avoid overall attacks second shortest path is chosen.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that “fake” shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
Data hiding can hide sensitive information into signals for covert communication. Most data hiding
techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is
not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the
embedded data and the original host signal. The project proposes the enhancement of protection system for secret data
communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique
used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by
making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering
techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash
function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two
are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is
not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative
decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are
regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on
normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC
code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks
with short information length
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
In this paper a new technology is proposed with a replacement of conventional voltage source/current
source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source
inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the
resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In
improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used.
By using a transformer with sufficient turns ratio the size can be reduced. The turn’s ratio of the transformer decides
the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working
with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.
Foliage Measurement Using Image Processing TechniquesIJTET Journal
Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCT’s. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCT’s with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.
A Five – Level Integrated AC – DC ConverterIJTET Journal
This paper presents the implementation of a new five – level integrated AC – DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre – regulator and five – level DC – DC converter. The single – stage PFC (SSPFC) approach used in this topology is an alternative solution to low – power and cost – effective applications.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with
horizontal cantilever ”outrigger” trusses or girders connecting the core to the outer column. When the structure is loaded
horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and
compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral
stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the
core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by
varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap
2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures
subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by
eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to
earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically
braced frame ensures safety against collapse.
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionIJTET Journal
Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has become common. The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching images from large databases. It can also be applied to image authentication as it produces different results with respect to the change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely, enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color modification, and for locating the forged area. The local models include position and texture information of object regions in the image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Overview on Edible Vaccine: Pros & Cons with Mechanism
Raspberry Pi Based Client-Server Synchronization Using GPRS
1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
94
Raspberry Pi Based Client-Server Synchronization
Using GPRS
Geraldine Shirley N 1
Dr. S. Jayanthy2
Sri Ramakrishna Engineering College, Sri Ramakrishna Engineering College
M.E. Embedded Systems Technologies Professor, Department of ECE
geraldine.shirley31@gmail.com jayanthy.s@srec.ac.in
Abstract— A low cost Internet-based attendance record embedded system for students which uses wireless technology to
transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a
client which stores the details of the students in the database by using user login system using web. When the user logs
into the database the data is sent through GPRS to the server machine which maintains the records of the employees and
the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer
between the client and server. This system can be implemented to any real time application so as to retrieve information
from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the
limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is
transferred in a secure way from the client database and updated in the server database using GPRS technology.
Keywords- Embedded system, Raspberry Pi, GSM/GPRS, Client-Server database, Attendance record
1. INTRODUCTION
Wireless networking technology enables two or more computers
to communicate and relay data using standard network protocols,
without the hassle of network wiring and cabling. It is now not just
limited to wireless telephony but there is now a huge demand of
wireless technology for many types of applications like Internet and
web browsing, video and other text and multimedia based
application. GPRS stands out as one major development in the GSM
standard that benefits from packet switched techniques to provide
mobile subscribers with the much needed high bit rates for bursty
data transmissions.
Security is an important issue in mobile networks and has gained
a special attention in the GSM world. GPRS provides a security
function similar to that of GSM. It is responsible for authentication
and service request validation to prevent unauthorized service usage.
User confidentiality is also protected using temporary identification
during connections to the GPRS network.
Attendance Management System (AMS) is the easiest way to
assist the faculty and the lecturer for this time-consuming process.
There are various attendance management systems based on RFID,
Finger print modules and face detection schemes. But most of these
systems use Ethernet connection to connect to their server machines
to update the attendance and are expensive ones. This limitation is
overcome by this system which consists of Raspberry Pi (ARM11)
processor with GSM/GPRS SIM900 module interfaced with it which
acts as a client and through wireless connection it is connected with
the remote server where the data gets updated automatically in the
server database when the user logs in the client system using login
id.
The client transmits the valid information at periodic intervals to
the server. Thus the information of the student updated in the client
database is transferred in a secured way to the server system
database. Synchronization between the client and the server is done
GPRS connectivity.
Wireless automatic attendance management system that authenticates
using the login id of the individuals is a reliable scheme than other
systems.
2. RELATED WORKS
The main objective of Attendance Management System in PHP is
to check and prepare report or attendance for any particular
organizations such as for hospitals, schools, colleges, shopping mall
etc. With the help of attendance management system, it will
eliminate the manual calculation of working days for each and every
employees, its admin will easily analyze the result based on their
requirement such as number of absentees per day, number of
employees required to handle their tasks etc. Nithyappriya et al has
proposed a system using SSH connection to connect with the client
and server [1]. The main advantage in this is it uses client server
synchronization using GPRS and secured SSH connection. Some
drawbacks are only when the Ethernet connection fails the message
is transferred to the server from the client. Bala Saidulu et al has
proposed a low-cost Internet-based data processing system for real
time application so as to retrieve information from a data source of
the server system using GPRS module [2]. The drawback in this
system is it uses FTP server which is not a secured transmission.
Shraddha S. Chawhan at al has proposed a Mobile Phone Based
Attendance System (MPBAS) a phone application which gets
connected with the server through GPRS [3]. It is an efficient system
but it requires a smart phone for login and to connect for each user.
Implementing a web server on an embedded system having limited
resources to serve embedded web page to a web browser and which
can be accessed by the client and server by synchronization [4].
Efficient and effective management system with centralized
connection along with ease to manage it from remote servers to
transfer the information [5]. Attendance and monitoring students
Using mobile technology along with tracking system in rural places
where no internet and advanced technology is available [6]. Web-
Based Student Attendance System where no specific software
installation is required and automatically data updated to server with
2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
95
less risk of data loss, compared to a manual filing approach [7]. A
web server can be embedded into a device which can be accessed
remotely from a web browser. This embedded system can serve the
web documents on request by a client from other system. Such type
of a web server is called as Embedded Web Server (EWS).
To overcome the drawbacks of the existing systems a low cost
real time client server synchronization based on Raspberry Pi
embedded system using wireless GPRS connection is established in
a secured way for data transmission between them.
3. PROPOSED SYSTEM DESIGN
The system consists of Raspberry Pi board interfaced with
GPRS SIM900 module which acts as a client. In the remote the
server consists of windows system with a 3G modem connection.
The Raspberry Pi board is the central module with Broadcom
BCM2835 system-on-chip multimedia processor at 700MHz in
which CPU core is a 32 bit ARM1176JZF-S RISC processor.
SIM900 is a Quad-band GSM/GPRS module designed with a power
full single chip processor. The database used is PostgreSQL along
with PHP code for Login Web page.
3.1 BLOCK DIAGRAM
The Raspberry Pi is interfaced with the SIM900 GSM/GPRS
module via the USB port. A 3G sim is inserted in the GPRS module
for data connectivity. Figure 1 shows the block diagram of the
proposed system.
Fig.1. Block Diagram of the Proposed System
3.2 RASPBERRY PI
Hardware is a physical device that can be touched or held, like a
hard drive or a mobile phone. Software can be thought of as a
program or a collection of programs that instruct a computer on what
to do and how to do it. Below is an image of the Raspberry Pi which
describes some of the components that make up the hardware.
The hardware description of Raspberry Pi which is shown in
Figure 2 consists of the GPIO pin, SD slot, USB port and Micro
USB connector. The GPIO pins are used for serial communication
for interfacing GSM and GPS etc. It uses 16GB SD for installing the
Raspbian OS and for storage. The USB port is used for connecting
keyboard, mouse, dongle and pen drive. The power supply is given
through USB connector.
Fig.2. Hardware Components of Raspberry Pi
3.3 GSM/GPRS SIM900 MODULE
SIM900 is a complete Quad-band GSM/GPRS module designed
by SIMCom. Featuring an industry-standard interface, the SIM900
delivers GSM/GPRS 850/900/1800/1900MHz performance for
voice, SMS and data in a small form factor and with low power
consumption. It is designed as a DCE (Data Communication
Equipment). It provides a full modem serial port, which is used for
data transmission and for sending AT commands.
The SIM900 is integrated with the TCP/IP protocol along with
extended TCP/IP AT commands are developed for customers to use
the TCP/IP protocol easily, which is very useful for data transfer
applications. Figure 3 shows the SIM900 Evaluation board.
Fig 3. SIM900 Evaluation board.
3.4 HARDWARE INTERFACING
The Raspberry Pi is interfaced with the SIM900 GSM/GPRS
module through the USB port. Separate power supply is given to the Pi
and the GPRS module. Figure 4 shows the hardware interfacing of the Pi
and the GPRS module.
Fig 4. Hardware interfacing
4. SYSTEM IMPEMENTATION
Based on the system design the system implementation is done
3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
96
and the required software’s are downloaded for the web-based login
system. Raspberry Pi is installed with Raspbian OS along with a 16
GB memory card. The web page is created using PHP and html. The
database used is PostgreSQL which save all the students records.
Finally the GPRS is initialized and connected to the server by python
code using AT commands.
4.1 POSTGRESQL
PostgreSQL is a powerful, open source object-relational database
system. It allows to extend the database with user-defined functions
by using various procedural languages, which often referred to as
stored procedures. Reduce the number of round trips between
application and database server. A database is created in the client
system which contains all the details about the students and their
unique login ids. Apache web server is installed in the client system
to view the web page created using PHP script.
4.2 PHPAND HTML
The PHP Hypertext Pre-processor (PHP) is a programming
language that allows web developers to create dynamic content that
interacts with databases. It is basically used for developing web
based software applications and also to manage database, dynamic
content, session tracking, even build entire e-commerce sites. PHP5
version was used in this project.
HyperText Markup Language is the standard markup
language used to create web pages. Html Form is embedded with
PHP script to develop a Login webpage for the student’s attendance
management system. When the Id is typed the information about the
user is fetched from the database and shown in the webpage.
4.3 PYTHON IDLE
The Raspberry Pi is a Linux based operating system
environment with python as the main programming language. To
initialize the GPRS module AT commands are used in the python
code. In the terminal of the Raspberry Pi using Minicom we can
view the messages sent and received by the SIM900 module.
When the user logs in the webpage using the login id the
information about the user is fetched from the client database and
it is shown in the webpage and at the same time the GPRS python
code is executed and the data is sent to the remote server through
TCP/IP connection. When the Login Id is typed, automatically
the PHP post function will transfer the Id to the server and the
python script is called inside the PHP code to initialize the GPRS
in order to transfer the data.
4.4 REMOTE SERVER
A windows system with a 3G modem is used as a remote server
which accepts the data from the client through GPRS. Here the data
obtained is updated to the database where the attendance is marked
for each student when he/she logs in the client side. PgAdmin III is
used to see the updated data in the server database. To view the data
sent from the client through GPRS SocketTester is used. PHP script
is written in the server side to get the data from the client and to
update the attendance in the database. Periodically the database is
updated and the attendance is marked when user logs in the client
side.
4.5 SOFTWARE ALGORITHM
The software algorithm of client-server
synchronization with attendance management system is described
below.
ALGORITHM:
Step 1 : Boot the Raspberry Pi and Login as the user.
Step 2 : Open the Login webpage created in the web browser.
Step 3 : Type the User Id and press the submit button.
Step 4 : When the submit button is pressed automatically the
GPRS module is initialized.
Step 5 : In the client side when the data is fetched from its
Database the user Id is sent to the server system.
Step 6 : In the server side the data is received and viewed in
SocketTester.
Step 7 : The PHP code in the server side automatically gets the
data and compares it with the server database and if a
match exists automatically the attendance is updated.
Step 8 : Using PgAdmin III we can view the updated records
in the server database.
5. EXPERIMENTAL RESULTS
5.1 HARDWARE SETUP
The Raspberry Pi is interfaced with the SIM900 GSM/GPRS
module. Figure 5 shows the Pi interfaced with Sim900 module.
Fig 5. Raspberry Pi interfaced with SIM900 module
5.2 LOGIN WEBPAGE
The Login web page for the students is written in PHP code and
in the client side. Figure 6 shows the Login web page of the
attendance management system.
Fig. 6 Login web page
Now when the user types the unique Id the PHP post request fetches
the data from the database and displays the information about that
4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
97
particular user who logged into the client system.
Figure 7 and 8 shows the Login Id typed in the web page and when
the submit button is clicked the data from the database about the
particular user is shown.
Fig. 7 User typing the Login Id
Fig. 8 Information about the user fetched from the database
When the user types the wrong Id the system will show an error
message. Figure 9 shows the error message when user Id is wrong.
Fig.9 Error message when Login Id is wrong
When the information is shown in the web page automatically the
user id of that user is sent as post request from PHP script to the
python code where automatically when the id is received the GPRS
module is initialized and the data is sent to the server side using AT
commands in python script. Figure 10 shows the AT commands
executed in the terminal when the python script runs and the data is
sent to the remote system.
Fig. 10 Executing of AT commands in terminal by running python script
The received data can be viewed in the server side by using
SocketTester. Figure 11 shows the data received from GPRS in the
SocketTester application running in the server system. Once when
the data is received the PHP code in the server automatically verifies
the user id and updates the attendance in the database.
Fig. 11 Data received from GPRS in the SocketTester
Similarly for each users a unique Id will be provided and on entering
the Id they can view the details and at the same time the attendance
will be updated in the server. Figure 12 shows the details of another
user when the Id is submitted.
Fig. 12 Details of another user when the Login Id is submitted
In the server side the PHP code is written where it compares the user
Id received from the client with the Id in the server database and
when it matches automatically the attendance is updated in the server
5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
98
database. Figure 13 shows the updated attendance in the server
database for two users.
Fig. 13 Updated attendance record in the server system
Thus the attendance management system is designed by
synchronizing the client and the server using GPRS wireless
connection.
6. CONCLUSION AND FUTURE WORK
In this project Raspberry Pi acts as a client system which stores
the details of users in database and a server machine is maintained to
administrate the databases in client machine. GPRS/GSM SIM900
module is used to synchronize the client with the server and to
transfer the data from client to server. It is a low cost attendance
management embedded system which uses wireless connection.
It can be used in rural areas for attendance system and when
there is a failure in the cabled Ethernet connection GPRS wireless
connection can be used. For future enhancement biometrics
fingerprint module can be used with Raspberry Pi for attendance
management.
REFERENCES
[1] P.Suvitha Vani, Nithyappriya.G “Establishing SSH Connection and
Interfacing GSM/GPRS Functionality with Raspberry Pi”, in Proc.
International Journal of Innovative Research in Computer and
Communication Engineering, Vol.2, Special Issue 1, March 2014.
[2] N. Bala Saidulu, V.Rajasree, “An Ftp Implementation with ARM
Processor and GPRS for Real Time Applications” in Proc. IOSR
Journal of Electronics and Communication Engineering, Vol 3,
Issue 2, pp 27-31, September 2012.
[3] Shraddha S. Chawhan, Mangesh P. Girhale, Gunjan Mankar,
“Mobile Phone Based Attendance System”, in Proc. IOSR Journal
of Computer Engineering, Vol 10, Issue 3, pp 48-50 March 2013.
[4] Girish Birajdar, “Implementation of Embedded Web Server Based
on ARM11 and Linux using Raspberry Pi”, in Proc. International
Journal of Recent Technology and Engineering, Vol 3 Issue-3, July
2014.
[5] Tinashe Nyabako, Emmanuel Manzungu, “Development of a GPRS
Internet Based Data Management System for Effective Dam
Operation in Zimbabwe”, in Proc. International Journal of
Business, Humanities and Technology, Vol. 1 No. 3; November
2011.
[6] Shivakumara M, Venkateswarlu, Shiva Yellampalli, “GPS and
GPRS based smart school management and child monitoring
system using mobile phones”, in Proc. International Journal of
Advanced Technology in Engineering and Science, Vol 3, Issue 1,
January 2015.
[7] Abdul Aziz Mohammed, Jyothi Kameswari U, “Web-Server based
Student Attendance System using RFID Technology”, in Proc.
International Journal of Engineering Trends and Technology, Vol
4, Issue 5, May 2013.
[8] Ankita Agrawal and Ashish Bansal, “Online Attendance
Management System Using RFID with Object Counter”, in Proc.
International Journal of Information and Computation Technology,
Vol 3, No 3, pp. 131-138, May 2013.
[9] http://www.raspberrypi.org
[10] http://www.tutorialpoint.com