SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 603
SURVEY ON SMART OBJECT DETECTION USING ESP8266
Srividya Ramisetty
Dept. of ISE, CMR Institute of Technology, Bengaluru, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - These days Human Beings are facingaproblem of
forgetting their belongings very often. In order to overcome
this, we are implementing object detection using ESP8266
device. ESP8266 is a low-cost Wi-Fi microchip withfullTCP/IP
stack and microcontroller capability. Electronic Stability
Program (ESP) is a computerized technology which acts as a
Hotspot. Here we make use of set of ESPs’ in which one acts as
a transmitter (hotspot) and rest acts as receiver. Inthismodel,
the ESP transmitter (Hotspot) send signals to the set of ESP
receivers. Whenever, any of the receiver device exceeds the
specified range of the Hotspot, then it producesanalertsound.
Key Words: ESP8266, Microcontoller, switch, buzzer
Arduino.
1.INTRODUCTION
People forget their belongings very often, by making use of
this model (longer range) it assures people not to forget
their belongings. People lose their belongings very often, by
making use of this model (shorter range) it helps people
search the lost belongings. If any one of the ESPreceivers get
disconnected, it is possible to connect another device by
dumping a new code. Making use of a set of ESP8266devices
ensure the user that all of his/her belongings are present
within the range. As ESP transmitter acts as a Hotspot, it is
connected to all the ESP receivers. Whenever any ESP
receiver exceeds specified range of Hotspot, then the
transmitter produces an alert sound indicating that the
receiver has exceeded the range of the Hotspot.
This model can be used in Longer Range or Shorter Range
mode.Longer range is a method which detects the ESP
receiver when it exceeds the specified range of the Hotspot
whereas shorter range is a method which detects the ESP
receiver when it enters the specified range of the Hotspot.
We make use of a toggle switch which will help us to select
the appropriate mode as per our convenience.
2. LITERATURE SURVEY
This section discusses the existing literature and the
shortcomings and problems in existing work.
Radio Frequency Identification (RFID) as being used in
anumber of practicalapplications,suchasinmprovingsupply
chain management, trackinghousehold pets, accessingoffice
buildings and speeding up toll collection on roadways. RFID
is used to automatically identify people, objects and animals
using short range radio technology to communicate digital
information between a stationary location (reader) and
movable object (tag).
RFID technology can be used to track products in a
manner similar to using bar codes for product identification,
but RFID also carries additional benefits. RFID does not
require line of sight to read the tag, has a longer read range
than a bar code reader and tags can store more data than bar
codes. Readers can simultaneously communicate with
multiple tags. This feature could allow customers to breeze
through grocery store checkout counters while a reader
identifies all items in a shopping cart at the same time,
instead of scanning each bar code individually.
RFID tags fall into two categories, Active tags, which contain
an internal power source and Passive tags which obtain
power from the signal of an external reader. Because of their
lower price and smaller size, Passive tags are more
commonly usedthanActivetagsforretailpurposes.Apassive
tag consists of a microchip surrounded by a printed antenna
and some form of encapsulation, plastic laminates with
adhesive thatcan be attachedto a product orasmallglassfor
implantation. The tag readerpowersandcommunicateswith
Passive tags. The tag’s antenna conducts the process of the
energy capture and ID transfer. A tag’s chip typically holds
data to identify an individual product, the productmodeland
manufacturer.
An emergingmobiletechnology,Beaconsenablesmart
phone applications to pinpoint their exactlocation,indooror
outdoor, with a level of accuracy down to a few centimeters.
The signal from a Beacon can be used to trigger a specific
application notification relevant to that location and time.
Beacons are inexpensive, small and often battery powered
devices that can be discretelyplaced in retail, entertainment,
hospitality, transport, healthcare,outdoormediaandprivate
locations to enable a wide variety of use cases. Beacons help
app developers to engage consumers at the right place and
time, pushing out the relevant information and content,
rather than requiring the consumer search for offers,
payment details, tickets or loyalty cards. Note, in some cases
an app may need to use a cellular or Wi-Fi connection to
display the appropriate content, while in other cases the
relevant content may already be cached within the app.
Beacons can also give app developers greater insight into
consumers behavior, for example by enabling them to track
the typical path through a store or dwell time at a particular
product.
Volume: 10 Issue: 02 | Feb 2023 www.irjet.net p-ISSN: 2395-0072
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 604
3. PROPOSED MODEL
In this Paper we are proposing a model which will be helpful
for detecting the misplaced or lost (within the specified
range) object. It isa normal function that every Human Brain
tends to forget so many things which is because of the
frustration undergone by Brain. In such a case the Human
Brain enters into a sort of Google search wherein the
subconscious mind tries to remember where the object was
being placed. The subconscious mind tries to get an answer
after a random amount of time. What if the subconscious
mind fails to get an answer? In order to overcome this, we
can make use of this model.
Basically, it is implemented using active device such as
ESP8266. In this model, we make use of multiple ESP8266
devices in which one of the devices act as a transmitter
whereas rest of the ESP8266deviceswillbehaveasreceivers.
Normally, an ESP8266 has a maximum range of 150 meters.
Fig.1 shows the proposed design and model. In the proposed
model ESP8266 transmitter’s range will be predefined in the
code. The rest of ESP8266 receivers will be present within
the specified range of the ESP8266transmitter.TheESP8266
transmitter when turned ON will ping each and every
receiver. If the receiver fails to send an Acknowledgement
packet it means that the receiver has exceeded the specified
range of the transmitter. This will result in an alert sound in
the transmitter indicating that the receiver has exceeded the
specified range of the transmitter.
MCU
SERVER
MODE
SWITCH
LCD
BUZZER
CLIENT 1
BUZZER
AND
SWITCH
CLIENT 2
CLIENT 3
BUZZER
AND
SWITCH
BUZZER
AND
SWITCH
Fig -1: Proposed model
The above explained scenario is known as Longer range
mode. It is also possible to make the model work in the other
way around, that is to make the transmitter produce an alert
sound when the receiver enters the specified range of the
transmitter. As transmitter pings each and every receiver, it
gets an Acknowledgement only if the receiver enters the
specified range which will be helpful to detect the nearby
misplaced objects. The aboveexplained scenario isknownas
Short range mode.
The components used are discussed as below:
3.1 ESP8266
The ESP8266 is a low-cost Wi-Fi microchip with
full TCP/IPstack and microcontroller capabilityproducedby
Shanghai-based Chinese manufacturer, Express if Systems.
The chip first came to the attention of western makers in
August 2014 with the ESP module, made by a third-party
manufacturer, Ai-Thinker. This small module allows
microcontrollers to connect to a Wi-Fi network and make
simple TCP/IP connections using Hayes-style commands.
However, at the time there was almost no English-language
documentation on the chip and the commands it
accepted. The very low price and the fact that there were
very few external components on the module which
suggested that it could eventually be very inexpensive in
volume, attracted many hackers to explore the module,chip,
and the software on it, as well as to translate the Chinese
documentation.
3.2 ARDUINO
Arduino is an open source computer hardware and
software company and user community that designs and
manufactures single-
microcontroller and microcontroller kits forbuildingdigital
devices and interactive objects that can sense and control
objects in the physical world. The project's products are
distributed as open source hardware and software, which
are licensed under the GNU Lesser General Public
License (LGPL) or the GNU General Public
License (GPL), permitting the manufacture of Arduino
boards and software distributionbyanyone.Arduino boards
are available commercially in preassembled form, or as do-
it-yourself (DIY) kits.
Arduino board designs use a variety of microprocessors
and controllers. The boards are equipped with sets of digital
and analog input/output (I/O)pinsthatmaybeinterfacedto
various expansion boards (shields) and other circuits. The
boards feature serial communications interfaces,
including Universal Serial Bus (USB) onsome models,which
are also used for loading programs from personal
computers. The microcontrollers are typically programmed
using a dialect of features from the programming
languages C and C++. In addition to using traditional
compiler tool chains, the Arduino project provides
an integrated development environment (IDE) based on
the Processing language project.
Volume: 10 Issue: 02 | Feb 2023 www.irjet.net p-ISSN: 2395-0072
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 605
The Arduino project started in 2003 as a program for
students at the Interaction Design Institute Ivrea in Ivrea,
Italy, aiming to provide a low-cost and easy way for novices
and professionals to create devices that interact with their
environment using sensors and actuators. Common
examples of such devices intended for beginner hobbyists
include simple robots, thermostats, and motion detectors.
The name Arduino comes from a bar in Ivrea, Italy,where
some of the founders of the project used to meet. The bar
was named after Arduino of Ivrea, who was the margrave of
the March of Ivrea and King of Italy from 1002 to 1014.
Arduino is open-source hardware. The hardware
reference designs are distributed under a Creative
Commons Attribution Share-Alike 2.5 license and are
available on the Arduino website. Layout and production
files for some versions of the hardware are also available.
The source code for the IDE is released under the GNU
General Public License, version 2. Nevertheless, an
official Bill of Materials of Arduino boards has never been
released by Arduino staff.
Although the hardware and software designs are freely
available under copyleft licenses, the developers have
requested the name Arduino to be exclusive to the official
product and not be used for derived works without
permission. The official policy document on use of the
Arduino name emphasizes that the project is open to
incorporating work by others into the official
product. Several Arduino-compatibleproductscommercially
released have avoided the project name by using various
names ending in -duino
A program written with the IDE for Arduino is called
a sketch. Sketches are saved on the development computer
as text files with the file extension. ino. Arduino Software
(IDE) pre-1.0 saved sketches with the extension. pde.
The Arduino IDE supports the languages C and C++ using
special rules of code structuring. The Arduino IDE supplies
a software library from the Wiring project, which provides
many common input and output procedures. User-written
code only requires two basic functions, for starting the
sketch and the main program loop, that are compiled and
linked with a program stub main () into an executable cyclic
executive program with the GNU toolchain, also included
with the IDE distribution. The Arduino IDE employs the
program argued to convert the executable code into a text
file in hexadecimal encoding that is loaded into the Arduino
board by a loader program in the board's firmware.
3.3 LITHIUM BATTERIES
A lithium-ion battery or Li-ion battery (abbreviated
as LIB) is a type of rechargeable battery in
which lithium ions move from the negative electrode to the
positive electrode during dischargeandback whencharging.
Li-ion batteriesusean intercalated lithium compound as one
electrode material, compared to the metallic lithium used in
a non-rechargeable lithium battery. The electrolyte, which
allows for ionic movement, and the two electrodes are the
constituent components of a lithium-ion battery cell.
Lithium-ion batteries are common in-home electronics.
They are one of the most popular types of rechargeable
batteries for portable electronics,witha high energydensity,
tiny memory effect and low self-discharge. LIBs are also
growing in popularity for military, battery electric
vehicle and aerospace applications.
4. CONCLUSIONS
People forget and lose theirbelongingsveryoften, bymaking
use of this model it assures people not to forget their
belongings and also helps people to search the lost
belongings in the prescribed range. So, this model can be
used in two different ways they are Longer range and
Shorter range. If any one of the ESP receivers get
disconnected, it is possible to connect another device by
dumping a new code. In this proposed system, instead of
using Beacon Battery we are making use of Lithium ion
Battery as it has wide range of advantages such as High
energy density and it has the abilitytoself-discharge.Beacon
Batteries last for a longer time but they do not last forever,
once the battery is drained out it has to be replaced.
REFERENCES
[1] J.Aragones-Vilella et.al“A Brief Survey on RFID Privacy
and Security”, Proceedings of the World Congress on
Engineering 2007 Vol II, WCE 2007, July 2 - 4, 2007,
London, U.K
[2] Xiao Nie, Xiong Zhong“Security in the InternetofThings
Based on RFID: Issues and CurrentCountermeasures”in
Proceedings of the 2nd International Conference on
Computer Science and Electronics Engineering (ICCSEE
2013)
[3] Jitendra Kumar Gupta & K. K. Mishra“Efficient
Authentication in RFID Devices Using Et Al’s Algorithm”
on Global Journal of Computer Science and Technology
Network, Web & Security, Volume 12, Issue 16, Version
1.0 ,Year 2012
[4] Martin Feldhofer, Sandra Dominikus, and Johannes
Wolkerstorfer” D.VAM.11 Suggested Algorithms for
Light-Weight Cryptography n supported by the
Commission of the European Communities through the
IST program under contract IST-2002-507932.
[5] Axel Poschmann, Gregor Leander, and Kai Schra ”New
Light-Weight Crypto Algorithms for RFID” Conference:
Circuits and Systems, 2007. ISCAS 2007. IEEE
International Symposium.
Volume: 10 Issue: 02 | Feb 2023 www.irjet.net p-ISSN: 2395-0072
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 606
[6] Jatinder Teji, Rimmy Chuchra, Sonam mahajan,
Manpreet Kaur Gill, Manju Dandi “Detection and
Prevention of Passive Attacks in Network Security”
International Journal of Engineering Science and
Innovative Technology (IJESIT) Volume 2, Issue 6,
November 2013.
[7] Agusti Solanas and Jesus Manj “RFID Readers
Deployment for Scalable Identification of Private Tags”
P. Kitsos, Y. Zhang (eds.) RFID Security: Techniques,
Protocols 289 and System-on-Chip Design, Springer
Science Business Media, LLC 2008.
[8] Kapil Singh “Security in RFID Networks and Protocols”,
International Journal of Information and Computation
Technology. ISSN 0974-2239 Volume 3, Number 5
(2013), pp. 425-432, International Research
Publications House.
[9] Dale R. Thompson, Jia Di, Harshitha Sunkara, and Craig
Thompson “Categorizing RFID Privacy Threats with
STRIDE”.
[10] http://www.idconline.com/technical_references/pdfs/d
ata_communica tions/Security_attacks.pdf
Volume: 10 Issue: 02 | Feb 2023 www.irjet.net p-ISSN: 2395-0072

More Related Content

Similar to SURVEY ON SMART OBJECT DETECTION USING ESP8266

IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...IRJET Journal
 
PIR sensing with arduino
PIR sensing  with  arduinoPIR sensing  with  arduino
PIR sensing with arduinochetan kadiwal
 
IRJET - Home Automation for Physically Challenged and Elder People
IRJET -  	  Home Automation for Physically Challenged and Elder PeopleIRJET -  	  Home Automation for Physically Challenged and Elder People
IRJET - Home Automation for Physically Challenged and Elder PeopleIRJET Journal
 
IRJET - Zigbee based Street Light Control System
IRJET - Zigbee based Street Light Control SystemIRJET - Zigbee based Street Light Control System
IRJET - Zigbee based Street Light Control SystemIRJET Journal
 
IoT Based Smart Surveillance System
IoT Based Smart Surveillance SystemIoT Based Smart Surveillance System
IoT Based Smart Surveillance SystemIRJET Journal
 
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually ImpairedIRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually ImpairedIRJET Journal
 
IRJET- Smart Blind Stick for Visually Impaired People
IRJET-  	  Smart Blind Stick for Visually Impaired PeopleIRJET-  	  Smart Blind Stick for Visually Impaired People
IRJET- Smart Blind Stick for Visually Impaired PeopleIRJET Journal
 
Automatic Car Parking
Automatic Car ParkingAutomatic Car Parking
Automatic Car ParkingIRJET Journal
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEIRJET Journal
 
IRJET- Rescue of Psycological Infirmity People using Wirless Network
IRJET- Rescue of Psycological Infirmity People using Wirless NetworkIRJET- Rescue of Psycological Infirmity People using Wirless Network
IRJET- Rescue of Psycological Infirmity People using Wirless NetworkIRJET Journal
 
IRJET- Low Powered Radio Frequency and PIR Sensor based Security Device
IRJET- Low Powered Radio Frequency and PIR Sensor based Security DeviceIRJET- Low Powered Radio Frequency and PIR Sensor based Security Device
IRJET- Low Powered Radio Frequency and PIR Sensor based Security DeviceIRJET Journal
 
Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)raviteja srinivasula
 
DRISHTI – A PORTABLE PROTOTYPE FOR VISUALLY IMPAIRED
DRISHTI – A PORTABLE PROTOTYPE FOR VISUALLY IMPAIREDDRISHTI – A PORTABLE PROTOTYPE FOR VISUALLY IMPAIRED
DRISHTI – A PORTABLE PROTOTYPE FOR VISUALLY IMPAIREDIRJET Journal
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemlaharipothula
 
Third Eye for Blind using Ultrasonic Sensor Vibrator Glove
Third Eye for Blind using Ultrasonic Sensor Vibrator GloveThird Eye for Blind using Ultrasonic Sensor Vibrator Glove
Third Eye for Blind using Ultrasonic Sensor Vibrator Gloveijtsrd
 
Anam rajkumar sarvesh k10779,k10626
Anam rajkumar sarvesh k10779,k10626Anam rajkumar sarvesh k10779,k10626
Anam rajkumar sarvesh k10779,k10626shailesh yadav
 
Blind Navigation system
 Blind Navigation system Blind Navigation system
Blind Navigation systemNilesh Jha
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET Journal
 

Similar to SURVEY ON SMART OBJECT DETECTION USING ESP8266 (20)

Sdfgh
SdfghSdfgh
Sdfgh
 
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...
 
PIR sensing with arduino
PIR sensing  with  arduinoPIR sensing  with  arduino
PIR sensing with arduino
 
IRJET - Home Automation for Physically Challenged and Elder People
IRJET -  	  Home Automation for Physically Challenged and Elder PeopleIRJET -  	  Home Automation for Physically Challenged and Elder People
IRJET - Home Automation for Physically Challenged and Elder People
 
IRJET - Zigbee based Street Light Control System
IRJET - Zigbee based Street Light Control SystemIRJET - Zigbee based Street Light Control System
IRJET - Zigbee based Street Light Control System
 
IoT Based Smart Surveillance System
IoT Based Smart Surveillance SystemIoT Based Smart Surveillance System
IoT Based Smart Surveillance System
 
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually ImpairedIRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
 
IRJET- Smart Blind Stick for Visually Impaired People
IRJET-  	  Smart Blind Stick for Visually Impaired PeopleIRJET-  	  Smart Blind Stick for Visually Impaired People
IRJET- Smart Blind Stick for Visually Impaired People
 
Automatic Car Parking
Automatic Car ParkingAutomatic Car Parking
Automatic Car Parking
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
 
IRJET- Rescue of Psycological Infirmity People using Wirless Network
IRJET- Rescue of Psycological Infirmity People using Wirless NetworkIRJET- Rescue of Psycological Infirmity People using Wirless Network
IRJET- Rescue of Psycological Infirmity People using Wirless Network
 
IRJET- Low Powered Radio Frequency and PIR Sensor based Security Device
IRJET- Low Powered Radio Frequency and PIR Sensor based Security DeviceIRJET- Low Powered Radio Frequency and PIR Sensor based Security Device
IRJET- Low Powered Radio Frequency and PIR Sensor based Security Device
 
Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)
 
DRISHTI – A PORTABLE PROTOTYPE FOR VISUALLY IMPAIRED
DRISHTI – A PORTABLE PROTOTYPE FOR VISUALLY IMPAIREDDRISHTI – A PORTABLE PROTOTYPE FOR VISUALLY IMPAIRED
DRISHTI – A PORTABLE PROTOTYPE FOR VISUALLY IMPAIRED
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing system
 
Third Eye for Blind using Ultrasonic Sensor Vibrator Glove
Third Eye for Blind using Ultrasonic Sensor Vibrator GloveThird Eye for Blind using Ultrasonic Sensor Vibrator Glove
Third Eye for Blind using Ultrasonic Sensor Vibrator Glove
 
Anam rajkumar sarvesh k10779,k10626
Anam rajkumar sarvesh k10779,k10626Anam rajkumar sarvesh k10779,k10626
Anam rajkumar sarvesh k10779,k10626
 
Anam rajkumar sarvesh
Anam rajkumar sarveshAnam rajkumar sarvesh
Anam rajkumar sarvesh
 
Blind Navigation system
 Blind Navigation system Blind Navigation system
Blind Navigation system
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb People
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

SURVEY ON SMART OBJECT DETECTION USING ESP8266

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 603 SURVEY ON SMART OBJECT DETECTION USING ESP8266 Srividya Ramisetty Dept. of ISE, CMR Institute of Technology, Bengaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - These days Human Beings are facingaproblem of forgetting their belongings very often. In order to overcome this, we are implementing object detection using ESP8266 device. ESP8266 is a low-cost Wi-Fi microchip withfullTCP/IP stack and microcontroller capability. Electronic Stability Program (ESP) is a computerized technology which acts as a Hotspot. Here we make use of set of ESPs’ in which one acts as a transmitter (hotspot) and rest acts as receiver. Inthismodel, the ESP transmitter (Hotspot) send signals to the set of ESP receivers. Whenever, any of the receiver device exceeds the specified range of the Hotspot, then it producesanalertsound. Key Words: ESP8266, Microcontoller, switch, buzzer Arduino. 1.INTRODUCTION People forget their belongings very often, by making use of this model (longer range) it assures people not to forget their belongings. People lose their belongings very often, by making use of this model (shorter range) it helps people search the lost belongings. If any one of the ESPreceivers get disconnected, it is possible to connect another device by dumping a new code. Making use of a set of ESP8266devices ensure the user that all of his/her belongings are present within the range. As ESP transmitter acts as a Hotspot, it is connected to all the ESP receivers. Whenever any ESP receiver exceeds specified range of Hotspot, then the transmitter produces an alert sound indicating that the receiver has exceeded the range of the Hotspot. This model can be used in Longer Range or Shorter Range mode.Longer range is a method which detects the ESP receiver when it exceeds the specified range of the Hotspot whereas shorter range is a method which detects the ESP receiver when it enters the specified range of the Hotspot. We make use of a toggle switch which will help us to select the appropriate mode as per our convenience. 2. LITERATURE SURVEY This section discusses the existing literature and the shortcomings and problems in existing work. Radio Frequency Identification (RFID) as being used in anumber of practicalapplications,suchasinmprovingsupply chain management, trackinghousehold pets, accessingoffice buildings and speeding up toll collection on roadways. RFID is used to automatically identify people, objects and animals using short range radio technology to communicate digital information between a stationary location (reader) and movable object (tag). RFID technology can be used to track products in a manner similar to using bar codes for product identification, but RFID also carries additional benefits. RFID does not require line of sight to read the tag, has a longer read range than a bar code reader and tags can store more data than bar codes. Readers can simultaneously communicate with multiple tags. This feature could allow customers to breeze through grocery store checkout counters while a reader identifies all items in a shopping cart at the same time, instead of scanning each bar code individually. RFID tags fall into two categories, Active tags, which contain an internal power source and Passive tags which obtain power from the signal of an external reader. Because of their lower price and smaller size, Passive tags are more commonly usedthanActivetagsforretailpurposes.Apassive tag consists of a microchip surrounded by a printed antenna and some form of encapsulation, plastic laminates with adhesive thatcan be attachedto a product orasmallglassfor implantation. The tag readerpowersandcommunicateswith Passive tags. The tag’s antenna conducts the process of the energy capture and ID transfer. A tag’s chip typically holds data to identify an individual product, the productmodeland manufacturer. An emergingmobiletechnology,Beaconsenablesmart phone applications to pinpoint their exactlocation,indooror outdoor, with a level of accuracy down to a few centimeters. The signal from a Beacon can be used to trigger a specific application notification relevant to that location and time. Beacons are inexpensive, small and often battery powered devices that can be discretelyplaced in retail, entertainment, hospitality, transport, healthcare,outdoormediaandprivate locations to enable a wide variety of use cases. Beacons help app developers to engage consumers at the right place and time, pushing out the relevant information and content, rather than requiring the consumer search for offers, payment details, tickets or loyalty cards. Note, in some cases an app may need to use a cellular or Wi-Fi connection to display the appropriate content, while in other cases the relevant content may already be cached within the app. Beacons can also give app developers greater insight into consumers behavior, for example by enabling them to track the typical path through a store or dwell time at a particular product. Volume: 10 Issue: 02 | Feb 2023 www.irjet.net p-ISSN: 2395-0072
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 604 3. PROPOSED MODEL In this Paper we are proposing a model which will be helpful for detecting the misplaced or lost (within the specified range) object. It isa normal function that every Human Brain tends to forget so many things which is because of the frustration undergone by Brain. In such a case the Human Brain enters into a sort of Google search wherein the subconscious mind tries to remember where the object was being placed. The subconscious mind tries to get an answer after a random amount of time. What if the subconscious mind fails to get an answer? In order to overcome this, we can make use of this model. Basically, it is implemented using active device such as ESP8266. In this model, we make use of multiple ESP8266 devices in which one of the devices act as a transmitter whereas rest of the ESP8266deviceswillbehaveasreceivers. Normally, an ESP8266 has a maximum range of 150 meters. Fig.1 shows the proposed design and model. In the proposed model ESP8266 transmitter’s range will be predefined in the code. The rest of ESP8266 receivers will be present within the specified range of the ESP8266transmitter.TheESP8266 transmitter when turned ON will ping each and every receiver. If the receiver fails to send an Acknowledgement packet it means that the receiver has exceeded the specified range of the transmitter. This will result in an alert sound in the transmitter indicating that the receiver has exceeded the specified range of the transmitter. MCU SERVER MODE SWITCH LCD BUZZER CLIENT 1 BUZZER AND SWITCH CLIENT 2 CLIENT 3 BUZZER AND SWITCH BUZZER AND SWITCH Fig -1: Proposed model The above explained scenario is known as Longer range mode. It is also possible to make the model work in the other way around, that is to make the transmitter produce an alert sound when the receiver enters the specified range of the transmitter. As transmitter pings each and every receiver, it gets an Acknowledgement only if the receiver enters the specified range which will be helpful to detect the nearby misplaced objects. The aboveexplained scenario isknownas Short range mode. The components used are discussed as below: 3.1 ESP8266 The ESP8266 is a low-cost Wi-Fi microchip with full TCP/IPstack and microcontroller capabilityproducedby Shanghai-based Chinese manufacturer, Express if Systems. The chip first came to the attention of western makers in August 2014 with the ESP module, made by a third-party manufacturer, Ai-Thinker. This small module allows microcontrollers to connect to a Wi-Fi network and make simple TCP/IP connections using Hayes-style commands. However, at the time there was almost no English-language documentation on the chip and the commands it accepted. The very low price and the fact that there were very few external components on the module which suggested that it could eventually be very inexpensive in volume, attracted many hackers to explore the module,chip, and the software on it, as well as to translate the Chinese documentation. 3.2 ARDUINO Arduino is an open source computer hardware and software company and user community that designs and manufactures single- microcontroller and microcontroller kits forbuildingdigital devices and interactive objects that can sense and control objects in the physical world. The project's products are distributed as open source hardware and software, which are licensed under the GNU Lesser General Public License (LGPL) or the GNU General Public License (GPL), permitting the manufacture of Arduino boards and software distributionbyanyone.Arduino boards are available commercially in preassembled form, or as do- it-yourself (DIY) kits. Arduino board designs use a variety of microprocessors and controllers. The boards are equipped with sets of digital and analog input/output (I/O)pinsthatmaybeinterfacedto various expansion boards (shields) and other circuits. The boards feature serial communications interfaces, including Universal Serial Bus (USB) onsome models,which are also used for loading programs from personal computers. The microcontrollers are typically programmed using a dialect of features from the programming languages C and C++. In addition to using traditional compiler tool chains, the Arduino project provides an integrated development environment (IDE) based on the Processing language project. Volume: 10 Issue: 02 | Feb 2023 www.irjet.net p-ISSN: 2395-0072
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 605 The Arduino project started in 2003 as a program for students at the Interaction Design Institute Ivrea in Ivrea, Italy, aiming to provide a low-cost and easy way for novices and professionals to create devices that interact with their environment using sensors and actuators. Common examples of such devices intended for beginner hobbyists include simple robots, thermostats, and motion detectors. The name Arduino comes from a bar in Ivrea, Italy,where some of the founders of the project used to meet. The bar was named after Arduino of Ivrea, who was the margrave of the March of Ivrea and King of Italy from 1002 to 1014. Arduino is open-source hardware. The hardware reference designs are distributed under a Creative Commons Attribution Share-Alike 2.5 license and are available on the Arduino website. Layout and production files for some versions of the hardware are also available. The source code for the IDE is released under the GNU General Public License, version 2. Nevertheless, an official Bill of Materials of Arduino boards has never been released by Arduino staff. Although the hardware and software designs are freely available under copyleft licenses, the developers have requested the name Arduino to be exclusive to the official product and not be used for derived works without permission. The official policy document on use of the Arduino name emphasizes that the project is open to incorporating work by others into the official product. Several Arduino-compatibleproductscommercially released have avoided the project name by using various names ending in -duino A program written with the IDE for Arduino is called a sketch. Sketches are saved on the development computer as text files with the file extension. ino. Arduino Software (IDE) pre-1.0 saved sketches with the extension. pde. The Arduino IDE supports the languages C and C++ using special rules of code structuring. The Arduino IDE supplies a software library from the Wiring project, which provides many common input and output procedures. User-written code only requires two basic functions, for starting the sketch and the main program loop, that are compiled and linked with a program stub main () into an executable cyclic executive program with the GNU toolchain, also included with the IDE distribution. The Arduino IDE employs the program argued to convert the executable code into a text file in hexadecimal encoding that is loaded into the Arduino board by a loader program in the board's firmware. 3.3 LITHIUM BATTERIES A lithium-ion battery or Li-ion battery (abbreviated as LIB) is a type of rechargeable battery in which lithium ions move from the negative electrode to the positive electrode during dischargeandback whencharging. Li-ion batteriesusean intercalated lithium compound as one electrode material, compared to the metallic lithium used in a non-rechargeable lithium battery. The electrolyte, which allows for ionic movement, and the two electrodes are the constituent components of a lithium-ion battery cell. Lithium-ion batteries are common in-home electronics. They are one of the most popular types of rechargeable batteries for portable electronics,witha high energydensity, tiny memory effect and low self-discharge. LIBs are also growing in popularity for military, battery electric vehicle and aerospace applications. 4. CONCLUSIONS People forget and lose theirbelongingsveryoften, bymaking use of this model it assures people not to forget their belongings and also helps people to search the lost belongings in the prescribed range. So, this model can be used in two different ways they are Longer range and Shorter range. If any one of the ESP receivers get disconnected, it is possible to connect another device by dumping a new code. In this proposed system, instead of using Beacon Battery we are making use of Lithium ion Battery as it has wide range of advantages such as High energy density and it has the abilitytoself-discharge.Beacon Batteries last for a longer time but they do not last forever, once the battery is drained out it has to be replaced. REFERENCES [1] J.Aragones-Vilella et.al“A Brief Survey on RFID Privacy and Security”, Proceedings of the World Congress on Engineering 2007 Vol II, WCE 2007, July 2 - 4, 2007, London, U.K [2] Xiao Nie, Xiong Zhong“Security in the InternetofThings Based on RFID: Issues and CurrentCountermeasures”in Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013) [3] Jitendra Kumar Gupta & K. K. Mishra“Efficient Authentication in RFID Devices Using Et Al’s Algorithm” on Global Journal of Computer Science and Technology Network, Web & Security, Volume 12, Issue 16, Version 1.0 ,Year 2012 [4] Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer” D.VAM.11 Suggested Algorithms for Light-Weight Cryptography n supported by the Commission of the European Communities through the IST program under contract IST-2002-507932. [5] Axel Poschmann, Gregor Leander, and Kai Schra ”New Light-Weight Crypto Algorithms for RFID” Conference: Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium. Volume: 10 Issue: 02 | Feb 2023 www.irjet.net p-ISSN: 2395-0072
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 606 [6] Jatinder Teji, Rimmy Chuchra, Sonam mahajan, Manpreet Kaur Gill, Manju Dandi “Detection and Prevention of Passive Attacks in Network Security” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 6, November 2013. [7] Agusti Solanas and Jesus Manj “RFID Readers Deployment for Scalable Identification of Private Tags” P. Kitsos, Y. Zhang (eds.) RFID Security: Techniques, Protocols 289 and System-on-Chip Design, Springer Science Business Media, LLC 2008. [8] Kapil Singh “Security in RFID Networks and Protocols”, International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432, International Research Publications House. [9] Dale R. Thompson, Jia Di, Harshitha Sunkara, and Craig Thompson “Categorizing RFID Privacy Threats with STRIDE”. [10] http://www.idconline.com/technical_references/pdfs/d ata_communica tions/Security_attacks.pdf Volume: 10 Issue: 02 | Feb 2023 www.irjet.net p-ISSN: 2395-0072