1. The document discusses a system to detect snakes in agricultural fields using IoT technology and deep learning techniques. Sensors placed around field borders can detect snake movements and capture images, which are then analyzed using convolutional neural networks to identify if the snake is venomous.
2. If a venomous snake is detected, farmers would be alerted using a buzzer to take precautions. The system aims to reduce snake bite deaths among farmers and conserve snake populations in the area.
3. The document reviews several related works involving using sensors and deep learning to detect animals harming agriculture, monitor home intrusions, and identify snake species for medical treatment.
Indian Institute of Information Technology (IIIT) Ranchi invites recruiters to collaborate for better placements and internships of their 2018 graduates. Established in 2016 under a public-private partnership model, IIIT Ranchi offers graduate, postgraduate, and research programs in computer science and electronics & communication engineering. The institute aims to bridge the gap between academia and industry by providing state-of-the-art labs and exposure to real-life projects to complement students' learning. IIIT Ranchi focuses on the holistic development of students and looks forward to building on their encouraging relationships with industry recruiters.
The Role of Internet-of-Things (IoT) in HealthcareLuís Rita
The document discusses the role of Internet-of-Things (IoT) technologies in healthcare. It describes a multi-tier IoT system architecture consisting of biosensors, personal devices, and servers. Wireless communication standards are used to transmit health data from wearable devices to medical centers. Case studies from TigerPlace and Washington State University demonstrate how IoT can be used to detect physical and mental impairments through sensors and analyze activities of daily living.
Revised edition of IoT with more knowledge ,advantages of iot,results of iot,methodology,block diagram,flowchart of iot,details of hardware and software,details of sensor and powerfull features with diagram ,digramatical representation of iot will found very useful to the beginners also .domain iot in healthcare
A quantum computer performs calculations using quantum mechanics and quantum properties like superposition and entanglement. It uses quantum bits (qubits) that can exist in superpositions of states unlike classical computer bits. A quantum computer could solve some problems, like factoring large numbers, much faster than classical computers. The document discusses the history of computing generations and quantum computing, how quantum computers work using qubits, superpositions and entanglement, and potential applications like encryption cracking and simulation.
IoT and machine learning - Computational Intelligence conferenceAjit Jaokar
Slides for IoT and Machine learning talk. Sign up at Sign up at www.futuretext.com to get forthcoming copies of papers on IoT and Machine learning, Real time algorithms for IoT and Machine learning algorithms for Smart cities
Artificial intelligence and machine learning allow machines to sense, learn, reason, act and adapt without being explicitly programmed. Machine learning uses computational methods to perform tasks without explicit instructions by learning from large amounts of data. The document then provides examples of how artificial intelligence can benefit doctors, autonomous cars, banks, farmers, athletes and more by analyzing data to provide insights, accelerate processes, and improve performance.
The presentation introduces with the concept of "Internet of Things - IoT", it will cover IoT definition, some internet survey statistics, future growth of Internet and how it will connect the physical world objects with the virtual world, Applications of IoT Enabled World, Technical risks associated with it and a sweet video demonstrates the IoT concept of IoT enabled home.
This seminar presentation provides an introduction to quantum computing, including its history, why it is important, how it works, potential applications, challenges, and conclusions. Specifically, it discusses how quantum computers use quantum mechanics principles like qubits and superposition to perform calculations. The history includes early proposals in 1982 and key algorithms developed in the 1990s. Applications that could benefit from quantum computing are mentioned like cryptography, artificial intelligence, and communication. Issues like error correction, decoherence, and cost are also presented. In conclusion, quantum computers may be able to simulate physical systems and even develop artificial intelligence.
Indian Institute of Information Technology (IIIT) Ranchi invites recruiters to collaborate for better placements and internships of their 2018 graduates. Established in 2016 under a public-private partnership model, IIIT Ranchi offers graduate, postgraduate, and research programs in computer science and electronics & communication engineering. The institute aims to bridge the gap between academia and industry by providing state-of-the-art labs and exposure to real-life projects to complement students' learning. IIIT Ranchi focuses on the holistic development of students and looks forward to building on their encouraging relationships with industry recruiters.
The Role of Internet-of-Things (IoT) in HealthcareLuís Rita
The document discusses the role of Internet-of-Things (IoT) technologies in healthcare. It describes a multi-tier IoT system architecture consisting of biosensors, personal devices, and servers. Wireless communication standards are used to transmit health data from wearable devices to medical centers. Case studies from TigerPlace and Washington State University demonstrate how IoT can be used to detect physical and mental impairments through sensors and analyze activities of daily living.
Revised edition of IoT with more knowledge ,advantages of iot,results of iot,methodology,block diagram,flowchart of iot,details of hardware and software,details of sensor and powerfull features with diagram ,digramatical representation of iot will found very useful to the beginners also .domain iot in healthcare
A quantum computer performs calculations using quantum mechanics and quantum properties like superposition and entanglement. It uses quantum bits (qubits) that can exist in superpositions of states unlike classical computer bits. A quantum computer could solve some problems, like factoring large numbers, much faster than classical computers. The document discusses the history of computing generations and quantum computing, how quantum computers work using qubits, superpositions and entanglement, and potential applications like encryption cracking and simulation.
IoT and machine learning - Computational Intelligence conferenceAjit Jaokar
Slides for IoT and Machine learning talk. Sign up at Sign up at www.futuretext.com to get forthcoming copies of papers on IoT and Machine learning, Real time algorithms for IoT and Machine learning algorithms for Smart cities
Artificial intelligence and machine learning allow machines to sense, learn, reason, act and adapt without being explicitly programmed. Machine learning uses computational methods to perform tasks without explicit instructions by learning from large amounts of data. The document then provides examples of how artificial intelligence can benefit doctors, autonomous cars, banks, farmers, athletes and more by analyzing data to provide insights, accelerate processes, and improve performance.
The presentation introduces with the concept of "Internet of Things - IoT", it will cover IoT definition, some internet survey statistics, future growth of Internet and how it will connect the physical world objects with the virtual world, Applications of IoT Enabled World, Technical risks associated with it and a sweet video demonstrates the IoT concept of IoT enabled home.
This seminar presentation provides an introduction to quantum computing, including its history, why it is important, how it works, potential applications, challenges, and conclusions. Specifically, it discusses how quantum computers use quantum mechanics principles like qubits and superposition to perform calculations. The history includes early proposals in 1982 and key algorithms developed in the 1990s. Applications that could benefit from quantum computing are mentioned like cryptography, artificial intelligence, and communication. Issues like error correction, decoherence, and cost are also presented. In conclusion, quantum computers may be able to simulate physical systems and even develop artificial intelligence.
This document discusses the evolution of mobile phone technology from 0G to 6G. It provides details on the key features and technologies of each generation. 6G is described as providing terabit transmission speeds, zero distance connectivity, and availability in 2020. It will utilize technologies like smart antennas, ultra wideband radio, and fiber optic networks to allow for incredible data throughput and reduced lag for applications like gaming. The document concludes that 6G will be both user-centric and service-centric, representing the next step in connecting people worldwide through wireless networks.
IoT is a combination of hardware and software technology that produces trillions of data through connecting multiple devices and sensors with the cloud and making sense of data with intelligent tools
IoT in Healthcare is a heterogeneous computing, wirelessly communicating system of apps and devices that connects patients and health providers to diagnose, monitor, track and store vital statistics and medical information.
From The Guardian to Cisco, big business to small, it seems that everybody is talking about the Internet of Things — but what exactly is IoT and why does it matter?
Taking a deep dive, we explore the many faces of IoT in Healthcare. Technology research and advisory company, Gartner, currently place the Internet of Things at the peak of inflated expectations and there are certainly challenges. But IoT also holds real promise for healthcare and it is already making an impact today.
We demonstrate why the Internet of Things has a far reaching impact across all determinants of health and how it could lead to a broader model of healthcare. We look at some of the technologies that are available to buy or that are already in development today, whilst also exploring some of the very real challenges that integrating such technologies into healthcare presents. Finally, we offer some ideas about how you can get involved, whether you are a healthcare professional or not.
Teleportation involves dematerializing an object and transmitting information about its atomic configuration to another location where an identical replica is reconstructed. In 1993, physicists confirmed quantum teleportation was possible but destroys the original object. Experiments have successfully teleported photons using the phenomenon of quantum entanglement. For human teleportation, a machine would need to precisely analyze and transmit information about a person's trillion trillion atoms and reconstruct their body and memories in another location. While teleporting large objects like humans remains theoretical, physicists believe the technology could be used to build quantum computers within 20 years.
This document provides an overview of machine learning techniques for Internet of Things (IoT) applications. It begins with an introduction to the growth of IoT devices and need for analyzing IoT data. It then discusses taxonomy of IoT and machine learning, categorizing supervised, unsupervised, and reinforcement learning. The document outlines how machine learning can be integrated with IoT for applications like predictive maintenance, anomaly detection, and activity recognition. It also discusses challenges of selecting appropriate machine learning techniques for IoT and improving algorithm accuracy. The conclusion is that machine learning algorithms are well-suited for analyzing and making predictions from smart IoT device data.
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
This document discusses embedded systems and robotics. It begins by defining embedded systems as electronic systems where a microprocessor is embedded into an application to perform a single task. Examples like cell phones, washing machines, and traffic signals are given. The document then discusses microprocessors and microcontrollers, their components, applications in areas like automobiles, shoes, and medical devices. It also covers topics like computer architecture, layers of a computer system, embedded applications in industrial automation and robotics. Projects designed using microcontrollers are presented, including temperature monitoring and a micromouse robot.
(1) Brain Gate is an electrode chip implanted in the brain that detects electrical signals from neurons and sends them to a computer to control devices.
(2) The goal of Brain Gate is to provide a fast, reliable connection between the brain of a severely disabled person and a computer to allow thought-based communication and control.
(3) Brain Gate was first tested on monkeys and rats, allowing them to control cursors and robotic arms with their minds, and was then tested on humans in 2004, allowing a paralyzed man to control a computer using only his thoughts.
deep learning applications in medical image analysis brain tumorVenkat Projects
The tremendous success of machine learning algorithms at image recognition tasks in recent years intersects with a time of dramatically increased use of electronic medical records and diagnostic imaging. This review introduces the machine learning algorithms as applied to medical image analysis, focusing on convolutional neural networks, and emphasizing clinical aspects of the _eld. The advantage of machine learning in an era of medical big data is that signi_cant hierarchal relationships within the data can be discovered algorithmically without laborious hand-crafting of features. We cover key research areas and applications of medical image classi_cation, localization, detection, segmentation, and registration. We conclude by discussing research obstacles, emerging trends, and possible future directions.
This document provides an introduction to Internet of Things (IoT) and smart cities. It discusses Kevin Ashton who coined the term "Internet of Things" and his vision for using data to increase efficiency. Key enabling technologies for IoT like cheap sensors, bandwidth, processing and wireless coverage are outlined. Examples of IoT applications in various sectors like manufacturing, transportation, agriculture and smart cities are provided. The document also discusses challenges in making sense of the large amounts of data generated by IoT devices and the importance of a citizen-centric approach to building smart cities by leveraging crowdsourcing and citizen engagement.
Deep learning is a type of machine learning that uses multiple processing layers to learn representations of data with features that become more complex at each layer. Deep learning has achieved human-level performance in areas like image recognition by learning from large datasets. In healthcare, deep learning has been applied to tasks like detecting pneumonia from chest X-rays and skin cancer from images with accuracy comparable to doctors. However, challenges remain around data variability, uncertainty, class imbalance, and data annotation. Cross-area collaboration and data sharing are seen as key to realizing the potential of deep learning in healthcare.
The Braingate system allows a paralyzed man to control a computer using his thoughts by monitoring brain activity and converting intentions into commands. It was developed in 2003 by Cyberkinetics and Brown University scientists to help those who have lost limb control, like spinal cord injury patients, operate devices. The system includes a neurochip implanted on the motor cortex that detects neural signals which are transmitted to an external processor and converted to control a computer cursor. This provides an alternative pathway for communication and operating external devices through thought.
Quantum computing harnesses the laws of quantum mechanics to process information using quantum bits (qubits) that can exist in superpositions of states. It allows qubits to be entangled so that measurements of one qubit instantly affect others. This enables quantum computers to potentially solve certain problems exponentially faster than classical computers by performing calculations on all possible combinations of inputs simultaneously. However, quantum systems are fragile and prone to decoherence, making it challenging to perform many logical operations before error occurs. While still in early stages of development, quantum computing shows promise for applications in optimization, machine learning, and other domains where large data sets require extensive processing.
Shivam Chaddha gave a presentation on brain chips. The presentation covered the evolution of brain chips from early experiments in the 1950s to implantable devices today. It discussed technologies like BrainGate that allow paralyzed patients to control prosthetics and computers using only their thoughts. While promising benefits, brain chips also face challenges from technical limitations and safety/ethical concerns that scientists continue working to address. The presentation concluded that brain chip technology has helped patients but does not promise miracles and more research is still needed.
This document provides an overview of quantum computers, including their history, workings, applications, and comparisons to classical computers. It discusses how quantum computers can perform computations using superposition and entanglement to analyze multiple states simultaneously. The document traces the origins of quantum computing to proposals by Yuri Manin in 1980 and Richard Feynman in 1981. It explains that while a 2-bit classical computer can only analyze one state at a time, a 2-qubit quantum computer can analyze all 4 possible states simultaneously. The document suggests quantum computers may be able to solve currently intractable problems involving enormous data more efficiently, with examples including finding distant planets, earlier disease detection, and improved drug development.
The document provides an overview of the history and development of artificial intelligence (AI). Some key points:
- The field of AI was established in 1956 at the Dartmouth Conference where researchers proposed using computers to simulate human intelligence.
- Early milestones included programs that played games like checkers and proved mathematical theorems. Research focused on symbolic and knowledge-based approaches.
- In the 1980s, expert systems flourished but funding declined amid doubts about progress, known as an "AI winter." Subsymbolic approaches using neural networks also emerged.
- Modern AI incorporates both symbolic and subsymbolic techniques, with successes in games, robotics, machine learning and other domains. Knowledge representation and common-sense reasoning
This is a seminar on Quantum Computing given on 9th march 2017 at CIME, Bhubaneswar by me(2nd year MCA).
Video at - https://youtu.be/vguxg0RYg7M
PDF at - http://www.slideshare.net/deepankarsandhibigraha/quantum-computing-73031375
IRJET- IoT based Wireless Sensor Network for Prevention of Crop Yields fr...IRJET Journal
This document proposes an IOT-based wireless sensor network system to prevent crop damage from animals and enable smart farming. The system uses various sensors like IR, motion, camera, soil moisture, rain, gas, temperature and humidity sensors connected over a wireless network to detect animal intrusions. When an animal is detected, the camera captures an image, a minor shock is administered to scare away the animal, and alerts are sent to the farmer's phone. The sensor data is stored in the cloud for analytics. This system aims to help farmers protect their crops and yields from losses due to animals.
Smart Intrusion Detection System for Crop ProtectionIRJET Journal
The document summarizes a smart intrusion detection system for crop protection. It uses sensors like PIR and ultrasonic sensors to detect intruders in agricultural fields. When an intruder is detected, the system takes a photo using a camera, sounds an alarm, and sends an SMS alert to the farmer. This allows the farmer to monitor their fields remotely and take timely action to protect crops from threats like wild animals. The system is built around a Raspberry Pi and aims to provide low-cost, automated protection for farms without needing human guards.
This document discusses the evolution of mobile phone technology from 0G to 6G. It provides details on the key features and technologies of each generation. 6G is described as providing terabit transmission speeds, zero distance connectivity, and availability in 2020. It will utilize technologies like smart antennas, ultra wideband radio, and fiber optic networks to allow for incredible data throughput and reduced lag for applications like gaming. The document concludes that 6G will be both user-centric and service-centric, representing the next step in connecting people worldwide through wireless networks.
IoT is a combination of hardware and software technology that produces trillions of data through connecting multiple devices and sensors with the cloud and making sense of data with intelligent tools
IoT in Healthcare is a heterogeneous computing, wirelessly communicating system of apps and devices that connects patients and health providers to diagnose, monitor, track and store vital statistics and medical information.
From The Guardian to Cisco, big business to small, it seems that everybody is talking about the Internet of Things — but what exactly is IoT and why does it matter?
Taking a deep dive, we explore the many faces of IoT in Healthcare. Technology research and advisory company, Gartner, currently place the Internet of Things at the peak of inflated expectations and there are certainly challenges. But IoT also holds real promise for healthcare and it is already making an impact today.
We demonstrate why the Internet of Things has a far reaching impact across all determinants of health and how it could lead to a broader model of healthcare. We look at some of the technologies that are available to buy or that are already in development today, whilst also exploring some of the very real challenges that integrating such technologies into healthcare presents. Finally, we offer some ideas about how you can get involved, whether you are a healthcare professional or not.
Teleportation involves dematerializing an object and transmitting information about its atomic configuration to another location where an identical replica is reconstructed. In 1993, physicists confirmed quantum teleportation was possible but destroys the original object. Experiments have successfully teleported photons using the phenomenon of quantum entanglement. For human teleportation, a machine would need to precisely analyze and transmit information about a person's trillion trillion atoms and reconstruct their body and memories in another location. While teleporting large objects like humans remains theoretical, physicists believe the technology could be used to build quantum computers within 20 years.
This document provides an overview of machine learning techniques for Internet of Things (IoT) applications. It begins with an introduction to the growth of IoT devices and need for analyzing IoT data. It then discusses taxonomy of IoT and machine learning, categorizing supervised, unsupervised, and reinforcement learning. The document outlines how machine learning can be integrated with IoT for applications like predictive maintenance, anomaly detection, and activity recognition. It also discusses challenges of selecting appropriate machine learning techniques for IoT and improving algorithm accuracy. The conclusion is that machine learning algorithms are well-suited for analyzing and making predictions from smart IoT device data.
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
This document discusses embedded systems and robotics. It begins by defining embedded systems as electronic systems where a microprocessor is embedded into an application to perform a single task. Examples like cell phones, washing machines, and traffic signals are given. The document then discusses microprocessors and microcontrollers, their components, applications in areas like automobiles, shoes, and medical devices. It also covers topics like computer architecture, layers of a computer system, embedded applications in industrial automation and robotics. Projects designed using microcontrollers are presented, including temperature monitoring and a micromouse robot.
(1) Brain Gate is an electrode chip implanted in the brain that detects electrical signals from neurons and sends them to a computer to control devices.
(2) The goal of Brain Gate is to provide a fast, reliable connection between the brain of a severely disabled person and a computer to allow thought-based communication and control.
(3) Brain Gate was first tested on monkeys and rats, allowing them to control cursors and robotic arms with their minds, and was then tested on humans in 2004, allowing a paralyzed man to control a computer using only his thoughts.
deep learning applications in medical image analysis brain tumorVenkat Projects
The tremendous success of machine learning algorithms at image recognition tasks in recent years intersects with a time of dramatically increased use of electronic medical records and diagnostic imaging. This review introduces the machine learning algorithms as applied to medical image analysis, focusing on convolutional neural networks, and emphasizing clinical aspects of the _eld. The advantage of machine learning in an era of medical big data is that signi_cant hierarchal relationships within the data can be discovered algorithmically without laborious hand-crafting of features. We cover key research areas and applications of medical image classi_cation, localization, detection, segmentation, and registration. We conclude by discussing research obstacles, emerging trends, and possible future directions.
This document provides an introduction to Internet of Things (IoT) and smart cities. It discusses Kevin Ashton who coined the term "Internet of Things" and his vision for using data to increase efficiency. Key enabling technologies for IoT like cheap sensors, bandwidth, processing and wireless coverage are outlined. Examples of IoT applications in various sectors like manufacturing, transportation, agriculture and smart cities are provided. The document also discusses challenges in making sense of the large amounts of data generated by IoT devices and the importance of a citizen-centric approach to building smart cities by leveraging crowdsourcing and citizen engagement.
Deep learning is a type of machine learning that uses multiple processing layers to learn representations of data with features that become more complex at each layer. Deep learning has achieved human-level performance in areas like image recognition by learning from large datasets. In healthcare, deep learning has been applied to tasks like detecting pneumonia from chest X-rays and skin cancer from images with accuracy comparable to doctors. However, challenges remain around data variability, uncertainty, class imbalance, and data annotation. Cross-area collaboration and data sharing are seen as key to realizing the potential of deep learning in healthcare.
The Braingate system allows a paralyzed man to control a computer using his thoughts by monitoring brain activity and converting intentions into commands. It was developed in 2003 by Cyberkinetics and Brown University scientists to help those who have lost limb control, like spinal cord injury patients, operate devices. The system includes a neurochip implanted on the motor cortex that detects neural signals which are transmitted to an external processor and converted to control a computer cursor. This provides an alternative pathway for communication and operating external devices through thought.
Quantum computing harnesses the laws of quantum mechanics to process information using quantum bits (qubits) that can exist in superpositions of states. It allows qubits to be entangled so that measurements of one qubit instantly affect others. This enables quantum computers to potentially solve certain problems exponentially faster than classical computers by performing calculations on all possible combinations of inputs simultaneously. However, quantum systems are fragile and prone to decoherence, making it challenging to perform many logical operations before error occurs. While still in early stages of development, quantum computing shows promise for applications in optimization, machine learning, and other domains where large data sets require extensive processing.
Shivam Chaddha gave a presentation on brain chips. The presentation covered the evolution of brain chips from early experiments in the 1950s to implantable devices today. It discussed technologies like BrainGate that allow paralyzed patients to control prosthetics and computers using only their thoughts. While promising benefits, brain chips also face challenges from technical limitations and safety/ethical concerns that scientists continue working to address. The presentation concluded that brain chip technology has helped patients but does not promise miracles and more research is still needed.
This document provides an overview of quantum computers, including their history, workings, applications, and comparisons to classical computers. It discusses how quantum computers can perform computations using superposition and entanglement to analyze multiple states simultaneously. The document traces the origins of quantum computing to proposals by Yuri Manin in 1980 and Richard Feynman in 1981. It explains that while a 2-bit classical computer can only analyze one state at a time, a 2-qubit quantum computer can analyze all 4 possible states simultaneously. The document suggests quantum computers may be able to solve currently intractable problems involving enormous data more efficiently, with examples including finding distant planets, earlier disease detection, and improved drug development.
The document provides an overview of the history and development of artificial intelligence (AI). Some key points:
- The field of AI was established in 1956 at the Dartmouth Conference where researchers proposed using computers to simulate human intelligence.
- Early milestones included programs that played games like checkers and proved mathematical theorems. Research focused on symbolic and knowledge-based approaches.
- In the 1980s, expert systems flourished but funding declined amid doubts about progress, known as an "AI winter." Subsymbolic approaches using neural networks also emerged.
- Modern AI incorporates both symbolic and subsymbolic techniques, with successes in games, robotics, machine learning and other domains. Knowledge representation and common-sense reasoning
This is a seminar on Quantum Computing given on 9th march 2017 at CIME, Bhubaneswar by me(2nd year MCA).
Video at - https://youtu.be/vguxg0RYg7M
PDF at - http://www.slideshare.net/deepankarsandhibigraha/quantum-computing-73031375
IRJET- IoT based Wireless Sensor Network for Prevention of Crop Yields fr...IRJET Journal
This document proposes an IOT-based wireless sensor network system to prevent crop damage from animals and enable smart farming. The system uses various sensors like IR, motion, camera, soil moisture, rain, gas, temperature and humidity sensors connected over a wireless network to detect animal intrusions. When an animal is detected, the camera captures an image, a minor shock is administered to scare away the animal, and alerts are sent to the farmer's phone. The sensor data is stored in the cloud for analytics. This system aims to help farmers protect their crops and yields from losses due to animals.
Smart Intrusion Detection System for Crop ProtectionIRJET Journal
The document summarizes a smart intrusion detection system for crop protection. It uses sensors like PIR and ultrasonic sensors to detect intruders in agricultural fields. When an intruder is detected, the system takes a photo using a camera, sounds an alarm, and sends an SMS alert to the farmer. This allows the farmer to monitor their fields remotely and take timely action to protect crops from threats like wild animals. The system is built around a Raspberry Pi and aims to provide low-cost, automated protection for farms without needing human guards.
IRJET- GPS Arduino based Tracking and Alarm System for Protection of Wildlife...IRJET Journal
This document describes a GPS-based tracking and alarm system to protect wildlife animals. The key components are a GPS module to track animal locations, a temperature sensor to monitor animal health, and RFID tags to identify individual animals. The system works as follows:
1) A GPS module tracks animal locations continuously and sends the data to an IoT platform.
2) A temperature sensor monitors each animal's temperature frequently and alerts if levels change.
3) RFID tags identify individual animals, and an RFID reader sounds an alarm if an animal crosses its boundary.
4) All sensor data on location, temperature, and animal ID are continuously updated on the IoT platform for remote monitoring without direct human involvement.
ANDROID CONTROL WILD LIFE OBSERVATION ROBOTIRJET Journal
1) The document describes an Android-controlled wildlife observation robot that uses sensors like PIR and gas sensors to detect and monitor wildlife movements and forest fires.
2) The robot streams live video to users' phones via an ESP32 WiFi module. It can automatically move towards detected movements and spray water to control small fires.
3) The robot aims to allow safer wildlife observation compared to humans entering habitats. Its low-cost design could make the technology accessible to more conservationists.
Anti-poaching System to Detect Poachers and Conserve Forest EcosystemIRJET Journal
This document proposes an anti-poaching system that uses sensors to detect poaching activity in forests and notify authorities. The system uses a cell phone detector sensor to detect signals from cell phones between 0.8-2.5GHz and trigger an alert with the phone's location. It also uses a PIR motion sensor with a range of 7-12 meters to detect intruders, then triggers a camera to take an image and send it along with location data via GPRS to a central server for authorities to monitor. The system is designed to be low-power, ruggedized and mounted in forests to automatically detect and report poaching activities to help conservation efforts.
In forest zone and agricultural field human animal conflict is a major problem where enormous amount of resources is lost and human life is in danger. Due to this People lose their crops, livestock, property, and sometimes their lives. So this zone is to be monitored continuously to prevent entry of wild animals. With regard to this problem, we have made an effort to develop the system which will monitor the field. That is at first it will detect intrusion around the field using sensor, then camera will capture the image of the intruder and classifying them using image processing and then Taking suitable action based on the type of the intruder. Finally sends notification to farm owner and forest officials using GSM.
This document describes a wildlife monitoring and tracking system using Internet of Things (IoT) technologies. The system uses sensors like smoke sensors, motion sensors, and accelerometers attached to animals to monitor their location, detect forest fires and illegal activities like deforestation. The sensor data is sent to the cloud via GSM modules and GPS for storage and analysis. The system aims to help protect wildlife by monitoring their movements and habitats while preventing physical barriers that can harm animals. It can also detect issues like fires and illegal logging to alert authorities.
IRJET- A Smart Farmland using Raspberry Pi Crop Prevention and Animal Intrusi...IRJET Journal
This document describes a smart farmland system that uses Raspberry Pi to detect animal intrusions and prevent crop damage. The system utilizes RFID tags injected into animals, along with an RFID reader and GSM modem. When an animal enters the farmland, the RFID reader detects its tag and sends an SMS alert to farmers and forest officers. It then uses noise from a speaker and smoke from a fog machine to irritate and repel the animal back to the forest without harming it. The system aims to provide an effective solution to the widespread problem of animals damaging crops in a more humane way compared to traditional electric fencing.
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...IRJET Journal
This document proposes an IoT-based wireless sensor network system to detect wild animals approaching agricultural lands near forests and prevent crop damage. The system uses PIR motion sensors, sound sensors, and web cameras deployed along forest borders to detect animal movement. An Arduino board collects sensor data and sends it over Zigbee to a Raspberry Pi master node. The master node sends the data to a server which processes it and signals speakers to emit noises to deter animals. It also alerts nearby farmers and authorities by text message. The goal is to provide an early warning system for protecting crops and preventing conflicts between wild animals and humans.
This document describes a proposed system to scare away animals from agricultural fields using sensors and remote operations. The system uses vibration sensors to detect animal intrusions and notifies farmers via mobile apps. Farmers can then remotely activate scary sounds, lights, or electric fires to scare animals away without being physically present. The system aims to increase crop protection and yields while saving farmers time and providing a humane way to address the issue of animal intrusions.
Third Eye for Blind using Ultrasonic Sensor Vibrator Gloveijtsrd
The primary goal of the project is to enable blind people to use an RF remote to find their gloves. This system gives visually impaired individuals walking exceptional security by incorporating a siren and attaching many sensors. Nowadays, individuals prioritize their safety above all else when they are driving, walking, or otherwise moving around. With the help of this system, we can track a blind persons whereabouts using a mobile device and receive emergency alert messages with their precise location. The technology also provides excellent security and shows them how to walk. The system has sensors for stair detection, soil detection, and obstacle recognition so that it may automatically identify impediments and deliver alerts. Using a soil moisture detector is used to find alerts in line with soil moisture levels. So that people may see the proper path while walking on the floor, stairs, and in many other locations, this approach can be very helpful. When an emergency arises, the system can be connected to a microcontroller and notify the appropriate people. A GPS receiver, a microcontroller, and a GSM modem are the components of this tracking system. This information is processed by the microcontroller and forwarded to the appropriate numbers after processing. Dr. B. Rambabu | S. Navya | M. Sahithi Vyas | A. Dishendra Sekhar "Third Eye for Blind using Ultrasonic Sensor Vibrator Glove" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-1 , February 2023, URL: https://www.ijtsrd.com/papers/ijtsrd53888.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/53888/third-eye-for-blind-using-ultrasonic-sensor-vibrator-glove/dr-b-rambabu
Blind Stick Using Ultrasonic Sensor with Voice announcement and GPS trackingvivatechijri
for blind individuals. Basically, the ultrasonic detector is enforced within the walking stick for detection the obstacles ahead of the blind/impaired persons. If there are any obstacles, it'll alert the blind man to avoid that obstacles and therefore the alert in Our project proposes a low-priced walking stick supported latest technology and a brand-new implementation are created for economical interface the shape of voice announcement and buzzer to form a lot of helpful the stick is additionally mounted with the water detector that detects and alerts the blind if any wetness content is present to avoid slippery methods. Daily in several aspects so as to produce versatile and safe movement for the individuals. During this technology driven world, wherever individuals try to measure severally, this project propose a low-priced stick for blind individuals to achieve personal independence, in order that they will move from one place to a different simply and safely. A conveyable stick is style and developed that detects the obstacles within the path of the blind using sensors. The buzzer and vibration motor are activated once any obstacle is detected. Additionally, the stick is provided with GPS and SMS message system. GPS system give the knowledge relating to the situation of the blind man using the stick with his relations. SMS system is employed by the blind to send SMS message to the saved numbers within the microcontroller just in case of emergency.
Comparative Study on Advanced Farm Security System Using Internet of Things a...vivatechijri
Internet of Things consists of two words Internet and objects. The term objects in IoT refers to various IoT devices that have unique identities and are capable of making remote sensing, performing and live monitoring of certain types of data. IoT devices enable other devices connected to the app directly or indirectly, and send data to various servers and combining IoT with Image processing in the agriculture sector can lead to a more technology driven system in terms of agriculture security which can create a Smart Agricultural Security System.
The major problem in today’s agriculture sector is protecting crops from local animals and thieves because it is not possible for every farmer to barricade the entire field or stay on the field 24 hours and guard it. So, to overcome this problem there must be an automated crop protecting system which uses leading technologies like IoT and Image Processing. The advantage of using this system can help farmer to monitor the farm even if farmer is away from field by installing various sensors in farm to detect motion of local animal and sent data to farmer app directly and also farmer can see live streaming of the farm with help of camera installed in farm. This ensures complete safety of crops from animals and thieves thus increasing financial gain with a proper security surveillance system.
A Survey on Various Animal Health Monitoring and Tracking TechniquesIRJET Journal
This document summarizes several existing techniques for animal health monitoring and tracking. It discusses sensors used to monitor temperature, heart rate, pulse rate, and respiration in animals. ZigBee modules are used to transmit sensor data to a GUI. The document then reviews several past studies on monitoring animal feeding behaviors, vital signs, localization using RFID, implantable biosensors, and movement tracking using GPS collars. It concludes that an integrated system for both health monitoring and movement tracking is needed. Future work aims to develop a wearable device incorporating sensors and wireless charging to monitor animals unobtrusively.
Wildlife entering in to populated areas has
recently become very Popular. The space for wild
animals is decreasing as humans are encroaching
forests. It creates great loss to property and life
when wild animals enter in to cities. We use latest
advances in technology such as Internet of Things
(IoT) to create an alert system of possible wildlife
leaving the forest and also the message will send to
the users Mobile to alert them. We use low cost
motion detectors and Passive Infrared sensors to
achieve this. We relay information of such motion
to a control centre to take further actions. We also
include making loud noise through speakers in
which the animals cannot enter in to land. The
basic idea of IoT is to connect different sensors
and establish communication and also provide
services. In this article, we make use of several IoT
devices at the periphery of natural reserve to
create an alert system. This system can also be
used to find out smugglers and other people
illegally entering in to the forest.
This document summarizes a seminar topic on animal monitoring using the Internet of Things. It discusses using sensors on animal collars to monitor body temperature, rumination, heart rate, and location. The hardware architecture uses collars on animals to collect sensor data and beacons to track location. A cloud platform analyzes the collected data to provide information to farmers on animal behavior and health. Potential applications include early detection of health issues in animals and understanding animal movement patterns. Future areas of research may involve using satellite tracking and camera traps to monitor wild animals. The conclusion evaluates machine learning algorithms for categorizing animal posture data collected from sensor collars.
Detecting Alive Human Using Robot for Rescue Operationvivatechijri
In the current technological world, the technologies are evolving day by day. These developments
make human life easier and more enthusiastic. The new high-speed technologies & growing computer capacity
provides advancement in the field of control theory. In the modern world, there are continuous development of
the skyscraper buildings & dwellings which increases the risk of losing life by natural calamities and manmade
disasters. During earthquakes, landslides, and building collapse, a lot of times, humans are trapped under debris
and it becomes impossible to detect their presence by the rescue team. Sometimes, it is impossible to reach certain
locations in calamity affected zone. Many models have been proposed for detection of human’s presence under
the debris in affected zone. This paper analyses various models developed to find the alive human being during
natural calamities.
INTEGRATED SYSTEM FOR REAL-TIME MONITORING & PROTECTION OF SANDALWOOD TREES U...IRJET Journal
This document describes an integrated system for real-time monitoring and protection of sandalwood trees using IoT and GSM technologies. The system uses wire sensors to detect illegal cutting of trees and flame sensors to detect forest fires. A Node MCU ESP8266 microcontroller collects sensor data and transmits it to a cloud server and the Blynk app. However, network connectivity issues present a challenge. To address this, a GSM module is integrated to enable offline alerts via SMS. The system aims to provide both online and offline alerts to authorities to facilitate early detection and prevention of illegal activities harming sandalwood trees.
Animal Repellent System for Smart Farming Using AI and Deep LearningIRJET Journal
This document summarizes a research paper on developing an animal repellent system for smart farming using artificial intelligence and deep learning. The system uses a camera to collect animal data, which is then classified using a deep convolutional neural network model trained on the data. It can identify different animal species in real-time. When an animal is detected, it sends an alert message and produces the appropriate ultrasonic frequency to repel that species. Testing on an animal dataset showed the CNN achieved over 98% accuracy in identifying animals. The system provides a real-time monitoring solution using AI to help farmers prevent crop damage from animals.
IRJET- Smart Cane for Blind People using IoTIRJET Journal
1) Students developed a smart cane for blind people using IoT that detects obstacles with ultrasonic sensors and alerts the user via audio output.
2) The system measures distance to obstacles, processes the data with an Arduino microcontroller and produces a voice alert for the user.
3) It also includes a GPS tracking system and guidance application to navigate the blind person's path.
Similar to Snake Detection in Agricultural Fields using IoT (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.