SlideShare a Scribd company logo
1 of 13
Download to read offline
Topic Name: Landslide monitoring using wireless
sensor network
Layer Name:
Network layer
ID Name Email Phone
Mahmudul Hasan
SL ID Name Email Attendance
1 Mahmudul Hasan present
2 Motiur present
3 Nahifa Binte Ahammed present
4 Sumaiya Ismail present
5 Razia Shultana Priya present
Submitted By:
Group Name: Decoders
Group Members:
Group Leader Name:
Group Picture
Introduction
• A collapse of a mass of earth or rock from a
mountain or cliff.
• They can be triggered by rain , floods , and
earthquakes as well as man made factors
such as slope grading or mining
• Landslides have the potential to happen
anywhere a steep slope is present
Damages
• Destroys the slope/hill
• Eliminates all vegetation
• Buries houses and sometimes entire villages
• Weakens the slope and makes it more
susceptible to further landslide
Some preventing methods :
• WSN ( wireless sensor networking)
• Rechargeable battery sensor
• Remote control sensor
Landslides prediction by WSN
• Data retrieved using spatially
distributed WSN.
• Wireless sensor nodes forward data on
to a gateway.
• Gateway sends data via a directional
wi-fi link to a field data management
center (FMC).
• Finally collected at a data management
center through a satellite link 252km
away from the deployment field.
Wireless sensor networks, individual sensors,
communication
Mechanism of WSN in landslide prediction
An example of using WSN in railway mountain
areas
Disadvantages
• Monitoring system tend to thin out with the times due to the loss of hardware
components.
• Maximum range is about 50m.
• Expensive
• Takes time to give data.
Introducing Zigbee
• The main hardware module used in this project
• Two zigbee modules
• Can communicate at high data rates
• Using peer to peer communication
• There is no data loss
Development of landslide detection
• Target is to reduce not only cost but also time
• transmitter side zigbee
• receiver side zigbee
• Sensor Nodes send data directly to receiver zigbee
• Power supply is used
• No human involvement neededPresent system Proposed system
This system has less
range, such as 50m.
By attaching a wireless
antenna, this will have
a broad range.
The system is
expensive.
Zigbee module and
power supply is cheap.
Takes time to
calculate data
transmission and give
decision.
Calculates everything
in a very short period
of time.
Conclusion
• This development provides the experience of design, development, and
deployment of a wireless sensor network for landslide detection. We plan to
determine the optimal number of geophysical sensors and wireless sensor
nodes with the hope of reducing the cost and energy consumption and thus
increasing the lifetime of the network.

More Related Content

What's hot

Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECEajitece
 
How 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoTHow 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoTQualcomm Research
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationDarshan Maru
 
Light wave-system-3855513
Light wave-system-3855513Light wave-system-3855513
Light wave-system-3855513Pooja Shukla
 
Millimeter Wave mobile communications for 5g cellular
Millimeter Wave mobile communications for 5g cellularMillimeter Wave mobile communications for 5g cellular
Millimeter Wave mobile communications for 5g cellularraghubraghu
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologiesInocentshuja Ahmad
 
Wireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajanWireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajanAbhishek Mahajan
 
M.Tech Thesis Defense Presentation
M.Tech Thesis Defense PresentationM.Tech Thesis Defense Presentation
M.Tech Thesis Defense PresentationDeeptanu Datta
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standardsM.k. Praveen
 
Parabolic antennas
Parabolic antennas Parabolic antennas
Parabolic antennas Rajat Shukla
 
Power delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadPower delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadManish Srivastava
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on JammingAbdul Haseeb
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumRohit Choudhury
 

What's hot (20)

Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
How 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoTHow 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoT
 
Test
TestTest
Test
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
Mm wave
Mm waveMm wave
Mm wave
 
CELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMSCELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMS
 
Seminar presentation on 5G
Seminar presentation on 5GSeminar presentation on 5G
Seminar presentation on 5G
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Light wave-system-3855513
Light wave-system-3855513Light wave-system-3855513
Light wave-system-3855513
 
Millimeter Wave mobile communications for 5g cellular
Millimeter Wave mobile communications for 5g cellularMillimeter Wave mobile communications for 5g cellular
Millimeter Wave mobile communications for 5g cellular
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
RADAR Jamming and Anti-Jamming
RADAR Jamming and Anti-JammingRADAR Jamming and Anti-Jamming
RADAR Jamming and Anti-Jamming
 
Wireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajanWireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajan
 
M.Tech Thesis Defense Presentation
M.Tech Thesis Defense PresentationM.Tech Thesis Defense Presentation
M.Tech Thesis Defense Presentation
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standards
 
Parabolic antennas
Parabolic antennas Parabolic antennas
Parabolic antennas
 
Power delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadPower delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spread
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
ELEMENTS OF CELLULAR RADIO SYSTEM DESIGN
ELEMENTS OF CELLULAR RADIO SYSTEM DESIGNELEMENTS OF CELLULAR RADIO SYSTEM DESIGN
ELEMENTS OF CELLULAR RADIO SYSTEM DESIGN
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
 

Similar to Landslide monitoring using WSN

A Study of Wireless Technology Based Pilgrim Tracking Systems
A Study of Wireless Technology Based Pilgrim Tracking SystemsA Study of Wireless Technology Based Pilgrim Tracking Systems
A Study of Wireless Technology Based Pilgrim Tracking Systemsdeepakiitr15
 
Part 2: Technical Specification HAJJ Pilgrims Tracking System
Part 2:  Technical Specification HAJJ Pilgrims Tracking SystemPart 2:  Technical Specification HAJJ Pilgrims Tracking System
Part 2: Technical Specification HAJJ Pilgrims Tracking SystemSazzad Hossain
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksJahan Zeb Xebi
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Transmission through various mediums for communication
Transmission through various mediums for communicationTransmission through various mediums for communication
Transmission through various mediums for communicationNeelanshi Rastogi
 
MOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptxMOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptxmyakamjagadish
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTINGdevika g
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxIrawanAbiyantoro1
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptDEEPAK948083
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptAjayTiwari301041
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Computer networks
Computer networksComputer networks
Computer networkssamina khan
 

Similar to Landslide monitoring using WSN (20)

Chapter 6.pptx
Chapter 6.pptxChapter 6.pptx
Chapter 6.pptx
 
A Study of Wireless Technology Based Pilgrim Tracking Systems
A Study of Wireless Technology Based Pilgrim Tracking SystemsA Study of Wireless Technology Based Pilgrim Tracking Systems
A Study of Wireless Technology Based Pilgrim Tracking Systems
 
Part 2: Technical Specification HAJJ Pilgrims Tracking System
Part 2:  Technical Specification HAJJ Pilgrims Tracking SystemPart 2:  Technical Specification HAJJ Pilgrims Tracking System
Part 2: Technical Specification HAJJ Pilgrims Tracking System
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networks
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
Transmission through various mediums for communication
Transmission through various mediums for communicationTransmission through various mediums for communication
Transmission through various mediums for communication
 
MOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptxMOBILE COMMERCE UNIT-III PPT.pptx
MOBILE COMMERCE UNIT-III PPT.pptx
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
Sensor.ppt
Sensor.pptSensor.ppt
Sensor.ppt
 
Sensor
SensorSensor
Sensor
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.ppt
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.ppt
 
M2M.pptx
M2M.pptxM2M.pptx
M2M.pptx
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Computer networks
Computer networksComputer networks
Computer networks
 

More from Sumaiya Ismail

Portfolio sumaiya ismail
Portfolio sumaiya ismailPortfolio sumaiya ismail
Portfolio sumaiya ismailSumaiya Ismail
 
Role of chemistry in cse
Role of chemistry in cseRole of chemistry in cse
Role of chemistry in cseSumaiya Ismail
 
Online resort reservation system report (practicum)
Online resort reservation system report (practicum)Online resort reservation system report (practicum)
Online resort reservation system report (practicum)Sumaiya Ismail
 
Comparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preferenceComparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preferenceSumaiya Ismail
 
Job description Format
Job description FormatJob description Format
Job description FormatSumaiya Ismail
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer wormSumaiya Ismail
 
Products with chemical elements (chm 117)
Products with chemical elements (chm 117)Products with chemical elements (chm 117)
Products with chemical elements (chm 117)Sumaiya Ismail
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...Sumaiya Ismail
 
Food ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysisFood ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysisSumaiya Ismail
 
Food ordering system for red bd csc 397
Food ordering system for red bd csc 397Food ordering system for red bd csc 397
Food ordering system for red bd csc 397Sumaiya Ismail
 
CSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and MaintenanceCSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and MaintenanceSumaiya Ismail
 
Strategies of improving Communication between University & Students
Strategies of improving Communication between  University & Students Strategies of improving Communication between  University & Students
Strategies of improving Communication between University & Students Sumaiya Ismail
 
Spelling Bee Competition Slide for school
Spelling Bee Competition Slide for schoolSpelling Bee Competition Slide for school
Spelling Bee Competition Slide for schoolSumaiya Ismail
 

More from Sumaiya Ismail (17)

Portfolio sumaiya ismail
Portfolio sumaiya ismailPortfolio sumaiya ismail
Portfolio sumaiya ismail
 
Role of chemistry in cse
Role of chemistry in cseRole of chemistry in cse
Role of chemistry in cse
 
Online resort reservation system report (practicum)
Online resort reservation system report (practicum)Online resort reservation system report (practicum)
Online resort reservation system report (practicum)
 
Comparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preferenceComparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preference
 
Job description Format
Job description FormatJob description Format
Job description Format
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
Cover letter
Cover letterCover letter
Cover letter
 
Products with chemical elements (chm 117)
Products with chemical elements (chm 117)Products with chemical elements (chm 117)
Products with chemical elements (chm 117)
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...
 
Food ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysisFood ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysis
 
Food ordering system for red bd csc 397
Food ordering system for red bd csc 397Food ordering system for red bd csc 397
Food ordering system for red bd csc 397
 
CSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and MaintenanceCSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and Maintenance
 
Internet
InternetInternet
Internet
 
Strategies of improving Communication between University & Students
Strategies of improving Communication between  University & Students Strategies of improving Communication between  University & Students
Strategies of improving Communication between University & Students
 
Spelling Bee Competition Slide for school
Spelling Bee Competition Slide for schoolSpelling Bee Competition Slide for school
Spelling Bee Competition Slide for school
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Landslide monitoring using WSN

  • 1. Topic Name: Landslide monitoring using wireless sensor network Layer Name: Network layer
  • 2. ID Name Email Phone Mahmudul Hasan SL ID Name Email Attendance 1 Mahmudul Hasan present 2 Motiur present 3 Nahifa Binte Ahammed present 4 Sumaiya Ismail present 5 Razia Shultana Priya present Submitted By: Group Name: Decoders Group Members: Group Leader Name:
  • 4. Introduction • A collapse of a mass of earth or rock from a mountain or cliff. • They can be triggered by rain , floods , and earthquakes as well as man made factors such as slope grading or mining • Landslides have the potential to happen anywhere a steep slope is present
  • 5. Damages • Destroys the slope/hill • Eliminates all vegetation • Buries houses and sometimes entire villages • Weakens the slope and makes it more susceptible to further landslide Some preventing methods : • WSN ( wireless sensor networking) • Rechargeable battery sensor • Remote control sensor
  • 6. Landslides prediction by WSN • Data retrieved using spatially distributed WSN. • Wireless sensor nodes forward data on to a gateway. • Gateway sends data via a directional wi-fi link to a field data management center (FMC). • Finally collected at a data management center through a satellite link 252km away from the deployment field.
  • 7. Wireless sensor networks, individual sensors, communication
  • 8. Mechanism of WSN in landslide prediction
  • 9. An example of using WSN in railway mountain areas
  • 10. Disadvantages • Monitoring system tend to thin out with the times due to the loss of hardware components. • Maximum range is about 50m. • Expensive • Takes time to give data.
  • 11. Introducing Zigbee • The main hardware module used in this project • Two zigbee modules • Can communicate at high data rates • Using peer to peer communication • There is no data loss
  • 12. Development of landslide detection • Target is to reduce not only cost but also time • transmitter side zigbee • receiver side zigbee • Sensor Nodes send data directly to receiver zigbee • Power supply is used • No human involvement neededPresent system Proposed system This system has less range, such as 50m. By attaching a wireless antenna, this will have a broad range. The system is expensive. Zigbee module and power supply is cheap. Takes time to calculate data transmission and give decision. Calculates everything in a very short period of time.
  • 13. Conclusion • This development provides the experience of design, development, and deployment of a wireless sensor network for landslide detection. We plan to determine the optimal number of geophysical sensors and wireless sensor nodes with the hope of reducing the cost and energy consumption and thus increasing the lifetime of the network.